How would you use technology to design a foolproof or safe identity document?
-
It is given: - a server used by a network you try to have access to; - your identity document with digital or technological features; - only a photograph can be taken of you, no privacy invasion. The goal is to create a secure way to check the identity of who you say you are, and to disallow identity theft or crimes. This is a follow up to:
-
Answer:
If biometric features(retinal, finger print etc) are to be skipped completely, there is still hope - photographs from multiple angles stored in the server are still good enough. Earlobes, distance between the eyes and the bridge of the nose and several other anatomical features together can provide sufficiently good enough authentication. Consider this - there are certain features of the human body which do not change over time and these can be used. There are instances of people wearing goggles, heavy make up defeating this mechanism, but accounting for fringe cases, this system should be enough if time is spent to polish and refine the tech.
Amar Prabhu at Quora Visit the source
Other answers
Your problem is foolproof and safe don't necessarily go together. Safe generally means a level of complexity to ensure it is not easily hacked. Foolproof normally means simplicity so that it is more difficult to socially engineer, which is generally difficult to achieve with complexity. My best answer here would be a 3 or even 4FA system that relies on a terminal such as a computer, a mobile device such as a smartphone and an identity card such as a drivers license or passport. The fourth factor could be biometric but the tech isn't quite there yet. Sticking to your criteria that biometric factor would probably would have to be fingerprint, facial or voice recognition. The terminal would have to have a VPN to the identity server and an external link to a 3rd party certification company. Minimum login complexity, network and OS security are assumed. The mobile device should ideally use a token system that works functionally similar to an RSA token. This avoids the potential of phone porting from SMS authentication. SMS authentication is also viable but it would probably take the solution beyond foolproof. Device and SIM encryption is assumed. The ID card should have a chip embedded in it that can be read by a proprietary reader device attached as a peripheral to the computer. Sufficient and proprietary encryption is assumed. The device would ask you log in using your login and password. It would then push a token to your mobile mobile device or rely on a predefined algorithm and ask you to enter it. You would then swipe your ID card and if all combinations successfully verified you would be allowed access.
Vaughan Ramsey
Related Q & A:
- How do I use auto-increment within a trigger?Best solution by dba.stackexchange.com
- How can we use our PC as a voice recorder?Best solution by Yahoo! Answers
- How do you use your camcorder as a webcam?Best solution by Ask Ubuntu
- How can I use my PC with a wireless printer?Best solution by pcmag.com
- How can i use my laptop as a monitor for my xbox 360?Best solution by Yahoo! Answers
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.