What security techniques can be implemented with RF-enabled smart card technology to improve the privacy and security of an identity verification system?
The following are examples of security techniques that can be implemented with RF-enabled smart card technology. • Mutually authenticating the identity credential and authorized interface devices or systems to ensure that only authorized valid credentials are accepted and only authorized systems can access information on the identity credential. • Encrypting the information communicated over the air interface to prevent skimming and eavesdropping. • Verifying the integrity of information communicated, to prevent modification or substitution of the information. • Ensuring that the user performs a conscious action to authorize the use of the credential (such as registering the credential with a system or entering a personal identification number or biometric). • Transmitting only the minimum information needed by the application to complete the transaction. • Randomizing any identification number communicated over the air interface to prevent the association of a specific RF-enabled cred