Increasing Secure Traveler Facilitation via e-Passport Passive Authentication

Electronic Passport (e-passport) technology, when implemented correctly – issued and validated in accordance with ICAO specifications and recommended processes – provides the highest level of assurance that the traveler is actually whom they claim to be.  The electronic security features encoded within the chip of the e-passport both protect the data from tampering or modification, as well as provide a cryptographic binding of the document to its Issuing State, and a biometric binding of the traveler to the document.  A global fabric of trust, the ICAO PKI data and processes underlying these documents, makes authentication of these security features relatively simple while ensuring that fraudulent documents are easily identified.

Incorporating these authentication processes into efficient, automated, self-service capabilities readily supports the facilitation of ever-increasing volumes of travelers without negatively impacting border queues – and actually increases the security posture of the transit point without the need for additional border personnel.

e-Passport processing not done according to specifications and guidance leaves the relying party to simply guess if the person presenting the document is who that document asserts that they are.

Sometimes this is inconsequential, sometimes it is a matter of national security.  Whether this document review is done as part of the check-in process at a hotel, to prove an identity for a financial transaction, or to support a border crossing, it is imperative that document authentication processes do not facilitate identity fraud or fraudulent cross-border movement.  If not properly validated, fraudulent documents can easily be used to transit borders for nefarious means, or to assume whatever identity that a person desires.

e-Passports were introduced in 2006 and now comprise the majority of travel documents in circulation.  However, since not all borders implement processes to properly authenticate these tremendously secure identity documents, fraud has also been facilitated.

In 2011, Somalia stated that they will no longer accept their original green passport (which is NOT an e-passport) due to their belief that the persons presenting these passports are likely to be engaging in terrorism-related activities.  The Israelis stated that they had over 135,000 documents stolen in 2010 alone, and they estimate that thousands of these documents are being used fraudulently around the world today.  In fact, they have arrested numerous Iranian and Pakistani nationals attempting to use fake Israeli passports.

While we know that 139 countries are currently issuing e-Passports, based on information available from open source resources, we also know that only a small percentage of countries actually perform Passive Authentication of e-Passports as part of their border control processes.

Passive Authentication (PA) is the process that ICAO requires be performed on the cryptographic security elements protecting the personal data held within e-passport and e-Identification documents. PA unconditionally proves the authenticity of the document by evaluating its cryptographic binding to a trusted issuance infrastructure.

Without this process, anyone can generate an e-passport that meets the electronic encoding requirements and appears to be genuine.

All of the elements protected by cryptographic hashes and the digital signature protecting the document security object may properly validate using the certificate provided within the document.  However, unless the certificate is proven cryptographically to have been produced by a trusted infrastructure, then the document cannot be considered authentic.  In other words, if PA fails, the document should be considered as fraudulent.

As the facilitation of an increasing number of travelers continues to be a top priority for nations, careful consideration must be given to the appropriate implementation of technology to support that objective.

Border processes cannot be cumbersome to the traveler or be perceived as the cause of delays.  Technology is increasingly being implemented to address this critical balancing act; self-service kiosks and automated border controls have been deployed or are being piloted across the globe.  However, with an increased reliance on technology to assess the validity and authenticity of the supporting travel document, the underlying processes MUST be implemented to leverage the significant security and level of identity assurance that is provided by the e-passport.  Many of these pilot implementations are basing an access decision on the comparison of the traveler’s biometrics to those found within the electronic chip of the e-passport.  While biometric comparison technologies are advancing at a tremendous rate, there is no value in performing the comparison unless the document that is being used as the source of the biometric has been proven to be authentic.

PA is a critical security component that must be implemented to truly take advantage of the anti-fraud and anti-tampering security features built into e-passports.  This process not only evaluates the authenticity of the document and its contents, but also facilitates the automation of traveler identity verification and transit throughout their journey.



Ozone e-Passport PKI

Protect your Patients from the Start: Automate Registration for a Speedier Process that is More Effective

Rise of Patient Identity Management Technology

Big data, machine learning, and artificial intelligence are slowly making their way into the healthcare industry with great results. EMR/EHRs software providers are always seeking improvements. However, without accurate data capture, building or integrating these tools will not prevent errors that result in costly claim rejections and even patient deaths due to misidentification. It is essential to avoid mistakes from the beginning of the process at patient registration.

The average duplication rate in a healthcare organization’s medical records is between 8 and 12 percent, according to the American Health Information Management Association. Duplicate records can create havoc such as mixing up patient identities, inability to track patient history, and extending the revenue cycle with issues such as claim rejections. Clean records are essential not only for efficiency, but also for implementing new technologies effectively. Accurate data prepares records for the next stages of patient identity management such as blockchain.

Accurate Patient Data Starts at Registration

One of Acuant’s partners is at the forefront of technologies that create efficient and user-friendly patient registration while providing clean and accurate data. Clearwave offers self-service check-in registration kiosks that help healthcare providers standardize and automate administrative and patient-facing processes. This creates a workflow that puts control of information in the patient’s hands and is an effective way to streamline the registration process. However, the intake process still had the issue of human errors such as typos or inputting insurance information incorrectly. Mistyped insurance member IDs were the most common error, which lead to significant problems.

Acuant partnered with Clearwave to implement intelligent data capture for government IDs and medical insurance cards that is powered by machine learning. The technology quickly and accurately reads a patient’s ID and insurance card and auto-populates the information into Clearwave’s registration software. Clearwave kiosks now process as many as 625,000 records a month, with charts being prepared an average of 9 minutes ahead of appointments. Read additional details in a case study.

Clearwave registration kiosk users spend 50% less time filling out forms and 70% less time in waiting rooms

Capturing accurate patient information helps to create a more frictionless, positive patient experience. Patients now account for 30% of healthcare revenue. As more patients become significant payers, the demand for transparency will continue to increase. Medical record errors, medication mistakes, claim rejections, and clunky software interfaces can create lasting negative impressions and cause patients to seek care elsewhere. While Health IT is moving rapidly and in exciting spaces, the importance of having clean data from the start cannot be stressed enough. Good data is the foundation for IT innovation.

Choose an Experienced Solutions Partner

Acuant has over 20 years of experience as a technology partner for healthcare and other industries, creating data capture and ID verification solutions. Talk to an ID Solutions Specialist and find out how your organization can transform patient registration and front-office workflows.


New Call-to-action

Congratulations to Our Partner on Being Acquired by Facebook

As a valued partner of over four years, we want to congratulate on their recent acquisition by Facebook. Our shared passion for making the mobile user experience simpler, safer and more secure ensured a successful partnership. enabled organizations to rapidly validate customer identity from a driver’s license or ID using advanced machine learning and computer vision technologies to dynamically normalize images, classify, extract and authenticate identity document data.

Facebook now asks users for a government issued ID if their account is locked, hacked or if they lost their passwords, but users must mail in this information. Their policy is to activate accounts only for authentic names to avoid catfishing and other such malicious activities where users portray themselves as a false person. Confirm’s technology can significantly streamline this process.  A natural progression may be to introduce verifying identities of all users creating or whom have created accounts to verify identities, especially when it comes to those advertising on the platform. Additionally, as social media platforms become increasingly acceptable as forms of ID verification, the vulnerabilities are clear. It would logically follow to make the account opening and ad buying processes more stringent when it comes to identity proofing.

Acuant’s partnership with Confirm created one of the industry’s most comprehensive cloud-based ID verification and authentication solutions, combining best-in-class technologies to support robust identity and document verification solutions to enterprises seeking remote identity proofing in the increasing landscape of card not present transactions. tapped Acuant’s automated intelligent data capture and authentication solutions, supported by its proprietary and unparalleled global document library to enable Confirm’s efficient ID authentication capabilities to drive safer transactions for its customers operating in a global environment. By leveraging Acuant’s AssureID technology, created an environment that supports secure transactions between businesses and people by linking physical ID documents to digital identities through mobile SDKs and RESTful APIs.

Technology that is intended to bridge the gap between physical and digital worlds and provide security- allowing businesses to confirm customer/user identities and customers to feel protected by businesses- continues to evolve. At Acuant we are poised to keep trusted transactions as frictionless as possible. To learn more about our products and service for all industries and across all platforms (mobile, desktop and cloud) please book time here to speak with a specialist.

We wish our friends and colleagues at all the best on the next part of the journey.

What You Need to Know to Prepare for the Real ID Act in 2018

Since the US Congress passed the Real ID Act in 2005, it has taken over 10 years to get states to comply with the new requirements. Even now, extensions for various states have been set until October 2018. The enforcement of the Real ID Act has been making headlines in travel-related news. Domestic travelers in the US are beginning to see signs at airports that a new type of driver’s license will be needed to get through airports and board planes. While many states are issuing Real IDs, confusion is rampant as to whether or not a Real ID is necessary, especially since a few years ago, many states were vocally in opposition to the law and even passed laws to reject the federal measure. Today, however, all states are complying with the legislature and here is what you need to know.

Definition of a Real ID

The Real ID Act was born from a recommendation by the 9/11 Commission after it was determined that hijackers boarded planes by presenting their driver’s licenses at security checkpoints. It is meant to provide stronger security around establishing the identity of a person.

This new form of identification is harder to forge, machine-readable, and is an effort to create stronger security measures around state-issued IDs. One way to identify compliance is from a small gold or black star that will be on the new IDs. All states must be able to issue new compliant IDs. However, it is up to the individual to apply for a compliant ID.

How to get a Real ID

A visit to the DMV is required to apply for a Real ID card. Applicants need to present the following documents:

  • Proof of Identity: Such as a US birth certificate, valid passport, or permanent resident card
  • Proof of Social Security Number: Such as a Social Security card or W-2
  • Proof(s) of Residency in the State: Documents include rental agreement, mortgage bill, utility bill, or medical insurance card

Other documents that would be helpful include proof of name change in the case of marriage, divorce, or court decree. Some states require multiple documents proving residency in the state, so it would be best to check with the DMV of the state for a checklist of required documents

Timeline of the Real ID Roll-out

  • Congress passes Real ID Act in 2005
  • Visitors to military bases must present Real ID or other approved ID starting October 10, 2017
  • All travelers on domestic flights must present Real ID or other approved ID starting January 22, 2018
  • All states must be able to issue Real IDs by October 2018
  • All domestic flight travelers must present Real ID compliant license by October 2020

Starting January 22, the TSA is requiring travelers to present a compliant ID or other forms of approved ID such as a passport. However, most states have received extensions to comply with the law, so for most people, a new form of ID is not needed to board a commercial flight until October 2020. As many states are still in the process of implementing and issuing new IDs, it would be wise to check ahead of any travel to make sure whether or not your ID is Real ID compliant.

Situations that require a Real ID

In addition to domestic air travel, a compliant driver’s license is needed to enter certain federal facilities which require ID such as military bases. Visitors and vendors will be turned away if the ID card presented is not Real ID compliant, so if your business is looking to establish military contracts it will be crucial for your employees to have compliant IDs.

A Real ID is not needed to:

  • Drive
  • Vote
  • Apply for or receive federal benefits (Veterans Affairs, Social Security Administration)
  • Enter a federal facility that does not require ID (post office)
  • Visit a hospital or receive life-saving services


Some groups such as the ACLU and libertarian-leaning states have voiced concerns about possible consequences. The new license is, some have argued, a national ID card and causes concerns that the federal government will create a database and track individuals. Another issue would be the demarcation of compliant vs. non-compliant licenses. In states such as California, driver’s licenses can be issued to undocumented individuals. However, these licenses will not be Real ID compliant. One hypothetical situation that is troubling is whether not carrying a compliant license may become a cause for detention or checking immigration status. Other groups that might be affected include the Amish and other religious communities, or the LGBTQ community such as a transgender person’s birth certificate not matching to other documents. As the roll-out continues, the effect of implementing the Real ID law across the country remains to be seen.



idscango trial

Card-not-present Fraud Increases as Consumers Move Online and Mobile

One of the biggest fraud warnings in the US and around the world for 2017 was credit card fraud, particularly card-not-present fraud. In Europe, card-not-present fraud increased from 50% gross loss in 2008 to 70% last year, with most fraud impacting the UK and France. Fraud experts warn this is just the beginning. The research firm Juniper predicted a 71 Billion USD loss globally due to card-not-present fraud over the next 5 years. As history dictates, when technology advances, so do criminals.

Shoppers and businesses were warned that there might be a massive fraud spike during Black Friday weekend. But in an impressive turn against the tide, it looks like US retailers were well prepared to combat fraud this season. Unlike what was initially predicted, credit card fraud dropped for the first time over Black Friday weekend by 29%. After the industry was rocked by huge data breaches from Target and other retailers, it looks like the investments made to boost security paid off.

Technology Is the Problem and the Solution for Retail

This good news for the retail industry might be a temporary reprieve. The transition to EMV chips in credit cards plays a big role in reducing point-of-sale fraud and might account for the drop in fraud during the holiday shopping season. The reality is that fraudsters will continue to follow the consumers.

In the US, m-commerce has been increasing year-over-year. For this holiday shopping season, purchases made on mobile devices were a 36.9% of all sales, and e-commerce was up 17% from last year. As more consumers move to online and mobile shopping, expect to see more card-not-present fraud as well. Public wi-fi can encourage more consumers to use their mobile devices to shop, but all those transactions also create opportunities for hackers to get sensitive information through key-logging, phishing, and other scams. Consumers might feel protected by all the technology they are using and have no idea how just how much risk is actually connected to these conveniences. For example, shoppers in India often have 3 or more shopping apps on their smartphones and almost half of all consumers have been victims of retail fraud.

Retail shopping isn’t the only industry that should be bracing for more card-not-present fraud. The recent data breaches at financial institutions and on sharing economy platforms show that pretty much any kind of online or mobile transaction poses a high risk to consumers and businesses.

Invest in Security Now or Pay a High Cost Later

One effective security measure to protect against card-not-present fraud is to add multi-factor or biometric authentication to tie the transaction to an actual person. Linking transactions to identities can reduce the risk of fraud both at check-out as well as help to lower the amount of customer data that businesses manage and store. This means businesses can protect against fraud while also minimizing the risk of being a target for data breaches.

Investing in customer data protection and keeping transactions secure is essential in creating customer trust and loyalty.  With its high competition and slim margins, the retail industry has learned that it cannot afford to be reactive and was effective in curbing point-of-sale fraud during the peak shopping season. We learned this year that other industries wrongly thought themselves to be immune to hackers. The consequences of major data breaches can last for years and be a crippling cost to many businesses.

As you prepare for 2018, make sure your business is incorporating the best practices for securing customer data and preventing card-not-present fraud. It is more cost-effective to invest in security measures now than to pay a much steeper price later.


Acuant Solutions for Customer ID Verification

Fraudsters Want Your ID Information. What Are You Doing to Stop Them?

In 2016, identity theft amounted to $16 billion and affected more than 15.4 million people in the United States. Your identity is arguably your most valuable asset, but how often are you aware of all the ways that you use it to transact? With the lines of physical and digital identity becoming increasingly blurred, it’s more important than ever to safeguard your identity during transactions.

Are you doing enough to ensure you’re keeping your personal information – and your customers’ information – safe from fraudsters?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Every day, Americans make transactions by swiping, scanning or chip-reading – from grabbing a cup of coffee to purchasing airline tickets. The convenience of these transactions, it seems, trumps concerns of information falling into the wrong hands. But the time has passed for simply hoping our ID information – and our customers’ ID information – will continue to be safe, simply because you’ve seen no evidence it’s been compromised.

Just a Day in the Life for Identity Thieves

Let’s look at a typical day anyone could have to see how easily one can expose their ID information to considerable security risks.

Mobile banking. Shortly after leaving the office, a person decides to check the balance of their checking account. They use the local coffee shop’s free Wi-Fi, because like 67% of Millennials, they use a mobile app to access their banking information. Though on an open network, they tap in their ID, password and perhaps other Know Your Customer (KYC) information, as required by anti-money laundering (AML) regulations. Did a fraudster track their every keystroke?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Small business transactions. Because this person is now running late to a doctor appointment, they pull out their credit card to engage one of the 1,000 bike-sharing services across the country, a market that is expected to become a $6.1 billion business by 2020. Are the security measures employed by all 1,000 vendors up to par? How does this one rank?

Medical Insurance. At the doctor’s office, they check in at the front desk, making their co-pay with the same credit card and giving their medical insurance card information which is likely photocopied. Like most people, this person is more than likely unaware that 15.4 million medical records were stolen in 2016 alone, and that 301 people across the country were charged roughly $900 billion in false billing.

Remember, Identity Thieves Never Take a Vacation

Although you’re in a rest-and-relaxation mode, you still know not to leave your hotel room unlocked or your wallet on a car seat. If only you could take similar measures to protect your ID information. Here are some common transactions that require ID information on a typical vacation – and some data associated with their risk of security breaches.

Accommodations. The global vacation rental market is poised to be worth $193.89 billion by 2021. Fully 46% of customers check in using hotel loyalty programs, and loyal customers spend on average 67% more than new ones. Front desks and agencies are mostly taking your identity document photocopying it and storing it somewhere; a very insecure data capture method. All this makes vacation rental businesses likely targets for theft of identity information.

Ground transport. Uber reported that 40 million people used the ride-hailing service in 2016. Incidentally, 8,000 ride-hailing service drivers in Massachusetts failed to pass new state background checks in 2017. Similarly, car-rental agencies routinely require a check of ID documents to complete transactions and mostly use the archaic photocopy method of capturing your ID leaving you vulnerable to a paper file floating around.

The More You Know, the Better

Our free infographic, Where Does Your Identity Take You in a Day , illustrates just how important it is to protect your ID information.

Acuant provides businesses with identity proofing solutions for trusted transactions, for more information contact us here.


Read the Infographic

How Machine Learning is Taking Identity Proofing Solutions to a Whole New Level

Artificial Intelligence (AI) enables computers to make human-like decisions, creating efficiencies that were previously unachievable. AI powers everyday technologies such as search engines, self-driving cars, and facial recognition apps. This technology is also leveraged for consumer identity access and management to protect consumers and businesses against fraud.

The Growth of ID-based Transactions

Banking, healthcare, government and many other industries employ ID verification and authentication to get accurate information about their customers and prevent ID fraud. As fraudulent transactions continue to rise, the need for a strong, customer-friendly identity proofing solution becomes critical.

Artificial Intelligence, and its subsets of machine learning and deep learning, make it possible to accurately process, verify, and authenticate identities at scale. Machine learning enables solutions to continually improve by learning from their data collection mechanism. This, in turn, informs the operation and performance of the software. For an in-depth look at machine learning and how it applies to your industry, read our latest white paper: Beyond Machine Learning.

Machine Learning for ID Proofing

Machine learning is an extremely efficient tool for discerning between real and fraudulent IDs. Computer software that is constantly learning and correcting itself can process millions of transactions at a rate unachievable by human experts.

However, IDs are physical documents that endure wear and tear, and may feature manufacturing discrepancies. If the model for passing or failing IDs is based on only a few samples, many real IDs will fail the test. This is where human oversight comes into play.

Machines and Humans Working Together for Highest Accuracy

Trained professionals using the software can step in to prevent bad customer experiences when the software flags a legitimate ID because it is damaged or worn.

During the rare instances where the computer fails to identify what is wrong with an ID, the professional can apply their expert eye, determine what error occurred and teach the computer how to spot the issue in the future. This creates a different method of learning where new information is being input to the learning model so the model can improve.

The benefits of machine learning combined with human expertise is the current standard in identity proofing solutions. Businesses want to be able to approve all good customers from the start with no friction. A good ID verification solution will do just that. In addition, when looking for a provider, businesses need to consider scope of expertise. Providers experienced in ID-based transactions across multiple industries help to ensure machines will have a model that has encountered multiple scenarios for failing or passing an ID.


Artificial Intelligence increases customer security and prevents fraud. Identity proofing providers are a trusted source to collect evidence of fraud, and through machine learning, that evidence can be analyzed and applied continuously to ensure higher accuracy.

Acuant is among the world leaders in applying machine learning to identity proofing solutions. Over the past 20 years, Acuant has accumulated the industry’s largest identity document library with government-issued ID documents and passports from over 190 countries. Acuant technology also has the ability to read characters in almost any language to ensure business are providing the most customer-friendly experience to instantly approve more good customers.

To join Acuant’s group of industry-leading partners, talk to an ID Solutions Specialist today.


Beyond Machine Learning

Stranger Danger: Why You Should Care About Verifying Identities in the Age of the Sharing Economy

The Sharing Economy, which in broad terms is defined as an economic system in which assets or services are shared between individuals via the internet and especially mobile apps, has become a major way in which Millennials transact. This includes conducting transactions for business, travel, on-demand services and virtually all lifestyle-type offerings for goods and services. According to Pew Research, about 72% of Americans have tried at least one platform or service.

While the rise of sharing economy apps appears to have made many luxury services and chores more convenient and accessible, there is the question of security. Not every app emphasizes security and privacy. Many use social media as a way to verify users. These are merely connected to a Facebook or other social profile, which can be easily faked. Then there is the question of employee verification. With so many services that allow users to invite providers into their private homes, a private car or a private location – one has to ask the question, how is my safety being addressed? We need only refer to Uber to see how instances of assaults by drivers and passengers have made customers, especially women, warier of these services. And we have all heard a crazy story about an Airbnb person who would not leave or destroyed the house. Wouldn’t it bring some peace of mind to know your driver, houseguest, online date, make-up artist etc., has been verified and that you know this before they enter your life?

Seeing a picture and name of your driver or delivery person does not mean necessarily that this person has been verified. Not every sharing economy platform conducts background checks and only in the last few years has ID verification become more of a concern to even the major platforms like the aforementioned Uber who now continuously verifies driver identities.

It is important for businesses to continually update their security by verifying IDs and conducting background checks. In addition, educating customers about best practices will also help to protect privacy and prevent a negative experience.

While companies catch up on their security standards, here are some tips for customers using apps and services:

  1. Learn to Spot Fake Reviews

Don’t be fooled by stellar reviews. If there are only a handful of 5-star reviews, these could have been written by personal friends. Pick someone with hundreds of good reviews and be assured that this provider is giving a consistent, positive experience.

  1. Research Company Methods of ID Verification the Background Checks

Before using any service, do some research about what kind of identity verification they use for employees and users, as well as if background checks are conducted, general policies, and whether there are outstanding lawsuits against the company. Checks such as sex offender registries, DMV records, or taking social security number information are some basic tests of a trusted service.

  1. Change your Profile Pictures

As Sharing Economy platforms become more popular, they often become targets of ID theft and confidence schemes. A good way to avoid being conned is to use a new photo not attached to any other platform that might contain personal information such as LinkedIn or even Facebook.

  1. Think Before You Speak

Don’t talk to strangers about your plans. A handyman, housekeeper, or driver from an app doesn’t need to know where you’re going or how long you’ll be away. In addition, it might be a good idea to let close friends or family know whenever you are on the road, in someone else’s home, or have someone in your own home.


Sharing economy platforms and services must do more to protect customer privacy and security. Verifying IDs is a crucial step in establishing trust between customers and providers. Acuant’s ID Proofing Solutions allow businesses to capture accurate ID data, ensure IDs are valid and verify identities in seconds for secure mobile transactions.

Download our idScanGo mobile app in the app store for iOS and Android to see the process in action with your own ID and insurance card.



idscango trial

PKI, Chip Technology Embraced to Fortify Security Defenses

As high-profile security breaches become more commonplace, companies and government agencies are increasingly looking to Public Key Infrastructure (PKI) technologies to enable strong authentication access controls and more robust data protection capabilities. Successful PKI-based, security chip implementations are designed to facilitate secure authentication.


Case in point, Congress is currently crafting a bipartisan piece of legislation called the IoT Cybersecurity Improvement Act of 2017 in an effort to secure IoT devices. One way of securing IoT devices in the workplace and home is through the use of PKI credentials to both identify the device and to securely authenticate those seeking access to the device – which can prevent unauthorized users from gaining access. As IoT devices become more ubiquitous, devices will need to authenticate themselves and have their own certificates to prove trustworthiness. Through the use of PKI, the chances of unauthorized access through IoT devices decreases.


PKI is also increasingly embraced in the healthcare industry as a way to meet security compliance regulations, particularly the standards of the Health Insurance Portability and Accountability Act (HIPAA). Devices with PKI technology help secure patient identities by only allowing access to authenticated users. The use of PKI technology in turn reduces the likelihood of litigation due to a HIPAA violation, and can also reduce the losses incurred due to identity fraud.


PKI can also be used in corporate environments to authenticate the identities of employees who request access to privileged company data. With the use of multi-factor authentication technologies like smartcards and biometrics, PKI can be used to offer another layer of identity security.  In fact, the US Department of Defense recognized an 80% reduction in unauthorized access to their systems once they fully implemented PKI-based access controls for their networks through the requirement for the use of the Common Access Card (CAC) smartcard in the place of passwords.


For border security, chips using PKI can also be leveraged to easily confirm the identities of travelers without sacrificing accuracy or negatively impacting the processing time for evaluation of the travel document. e-Passports add another layer of security to traditional non‑electronic passports by embedding an electronic chip in the passport. Performing an electronic evaluation of the e-passport chip data provides the highest level of assurance that the document is authentic, and is the only assurance that the biometrics on the chip are bound to the traveler.


Acuant’s recent acquisition of the Ozone e-Authentication product suite from identity solutions provider Mount Airey Group, further enhances its traditional physical security feature assessment capabilities and provides a comprehensive e-authentication solution for border control and other environments depending upon e-document validity. Acuant’s solution features certificate chain validation for e-passports, and implements country-specific policy controls.


In addition to support for e-passport issuance and border control processes, Ozone also supports PKI enablement across the enterprise.  With Ozone, application owners can enable their applications with PKI, without having to understand the complexities of PKI technology. Owners can manage application-specific authorizations without the need for modifications to the application software. Ozone also supports implementations across federal agencies to improve federated security leveraging existing Homeland Security President Directive #12 infrastructures.


Acuant’s Ozone Suite offers seamless PKI integration with smartcards, single sign-on schemes, and biometric authentication processes. The line of identity solutions supports enterprise-scale identity and access management (IDAM) solutions including e-Passport authentication, ICAO Public Key Directory (PKD) support, and eID document validation capabilities, as well as atomic authorization capabilities.  Consistent with Acuant’s flexible deployment strategy, the solution set supports traditional on-premise implementations, as well as supports cloud and mobility solutions.

Using PKI, Chip technology is a secure and efficient way to provide added security to your transaction.