Innovative and sophisticated security printing solutions leveraging security features, advanced technologies, and unique materials lay the foundation for document security.
Stated they reduce the risk of the card or holder's data being altered, copied, or reproduced.
Identity documents with an elaborate designs are the pride of the country and the citizens and are immediately recognized as trustworthy evidence of identification.
Let's dig in.
Document security features: goals
Security features can help verify by providing intuitive and easy-to-verify elements visible with the naked eye or by touch (tactile effects) and protect both the document structure and personal data.
The objective is to help an Immigration or Border Control Officer to answer two main questions. The third one can be answered by fingerprint matching or facial recognition.
- Is the document genuine?
- Is the citizen's data authentic?
- Is the person present the true owner of this document?
So what are we talking about?
ID levels in the security printing industry
Levels of Identity Security
Four recognized security levels could be implemented in identification documents.
It sounds simple. And it is.
Level 1 Security
The first level (overt) relates to security features that the public can easily check (in KYC checks, for example) without special aids.
Level 2 Security
Second-level (covert) relates to security features that can be checked with simple aids, such as magnifiers and UV lamps.
Level 3 Security
Third-level (forensic) security features are for qualified forensic laboratories and other sophisticated laboratory equipment.
Level 4 Security
The fourth security level is secret and includes safety measures known only to a narrow range of experts, often the manufacturer only.
Level 1 document security features: your front door key
The main principle of these security features is that fraud will preferably be detected at level 1- with the naked eye – and with close attention paid to altering personal information.
Watch some of our Level 1 and Level 2 features in our video.
The document is also protected against counterfeiting following the same principle.
Thales is highly experienced in security design and will propose, per customer requirements, a solution that delivers maximum protection against forgery, counterfeiting, and unlawful personalization.
The documents will also be manufactured using directly applicable techniques that are highly effective in this respect.
Three groups of security features
Three groups of security features can be implemented:
1. Security Features that are difficult to copy
- Security printing
- Optically variable features
- Non-printed security - elements such as holograms and surface structures
2. Security Features that are difficult to produce
- Security printing
- Optical effects
- Surface structures
3. Technologies/materials that are difficult to come by
- Certain printing technologies
- Security paper
- Special holograms
- Special high-security inks
Digital security: the 5th dimension
Digital security is the 5th level we did not mention earlier. It's a dimension unseen by the naked eye but real.
Think about this for a moment.
Electronic identity documents such as national ID cards or ePassports equipped with a microprocessor and secure applications offer an additional security dimension to the physical features.
Secured digital data is virtually impossible to alter, allowing reliable automated verification and easy machine readability.
For example, the microcontroller included in the passport represents a highly secure feature.
The best part?
If a counterfeiter successfully changes the portrait and citizen information on the data page, the data in the chip cannot be accessed and altered.
Any tampering attempt can be detected since the altered data will not compute correctly, as it has not been signed and authorized by the Issuing Authority.
If fingerprints are stored in the chip, a simple biometric matching can be done to verify the document to the person presenting it.
Smart security features
- Use of the latest cryptography to secure the data
- In-house developed end-to-end applications
- Biometric data for secure identification
- Highest level of privacy and security
- Confidential communication by contact or contactless, or both (dual interface)
Secure application features
- Secure data storage, identification, authentication, and digital signature
- Protection by PIN or biometric authentication
- Multi-usage of electronic cards for identification, travel, payment, and much more
- Automated verification
Yes, you've got it.
Security features and the microprocessor in the card or passport can create a powerful combination to authenticate the document and the holder's data.
Where do we fit?
Thales has a background in secure government printing dating back to 1886 with the acquisition of Setec, formerly Finland's National Printing House, in 2005.
Level 2 security feature: UV ink – here, you can see the edge of a passport under ultraviolet light.
Printing expertise includes banknotes, stamps, and identity documents, with a long track record in innovation.
Thales has five certified security printing sites worldwide (ISO 14298 INTERGRAF).
As a result, the company can offer clients unrivaled business continuity and global supply chain integrity to produce a wide range of innovative documents, including ePassports and eID cards.
Typically, Thales works with its security features experts to make the best possible selection of features to match the client's needs.
The goal is that the product and its authenticity can be indisputably trusted.
This goal is achieved using technologies that make documents impossible to copy, using several different techniques, using each technology at the highest available quality and level, and using rare means and materials with limited availability.
In other words, Thales uses technologies and materials that are difficult to copy, use, and come by.
More resources on ID security with our web dossiers