Monthly Archives: February 2013
Chip implants
Microchips implanted into the human body are an interesting alternative to e-ID documents. However, this technology implies a great potential for abuse. This article...
The Chinese e-Passport project
China has a long history of issuing identification documents for travel to neighbouring countries. According to surviving records dating from the late seventeenth century,...
Spotting the differences
In January of this year, the European Central Bank (ECB) unveiled the full design of the new EUR 5 banknote. This banknote is the...
Strategic goals regarding travel documents
In line with the strategic goals of the OSCE, the largest regional security organisation in the world, the OSCE’s Action against Terrorism Unit (ATU)...
Authentication technique composite substrates
Composite substrates that contain paper and polymer layers with the same thickness as traditional security paper are novel options for security documents, and unique...
Disruptive technologies in personal identification
In 2012, Smithers Pira published a major new study called ‘Ten-year Forecast of Disruptive Technologies in Personal Identification to 2022’1. The target of the...
Looking back and ahead
Ten years have passed since the first issue of Keesing’s Journal of Documents graced the desks of executives, technology suppliers, consultants, and others with...
Protecting vulnerable document elements
ID documents are valuable and must be protected against criminal attempts to counterfeit or tamper with them. The personal data, and in particular the...
Biometrics in the cloud
Until recently, businesses had to acquire their own information technology infrastructure, and house it within their own facilities. Although this set-up does have some...