Latest News

Optic-ID brings to states, businesses, consumers and citizens
secure solutions to identify face-to-face and online,
and to facilitate their economic and social life.

Our main technologies are a verification method for 3D markings such as holograms, and a brute force resistant technology



Verification Method for 3D Markings



How easy it is to steal your identity!

All the fraudster has to do is to make a photography of your ID card, replace your photo by his with an image editor, add the appearance of the required hologram, print the result and show it to his smartphone when he is asked to. The identity verification company will then ask him to shoot a selfie and compare his appearance with… his own photography. He will be registered as being you!


Under your name, he may then open bank accounts, order products, make reservations, view your health records, and enter into your web pages and computers! These are only examples and he certainly has much more imagination.

Optic-ID has developed technologies that authenticate holograms and other security devices protecting identity cards, passports, banknotes and many other documents and products.

These technologies, which are protected by patents already issued in the USA and in Europe, are essential for identifying oneself online, signing electronically, paying online, entering premises or intranets. These are only examples.

Targeted markets represent tens of billions of dollars, and it seems that no competing technique exists. These are therefore monopolies that will be protected for the benefit of a few companies licensed from the patents.

Some competitors claim to authenticate holograms with a photograph or a scan, whereas it is necessary to make two acquisitions from two different points of view or by changing illumination conditions, and to compare at least one of the acquisitions with a reference to be certain that the document presented is not a copy obtained by photographic processes. This is precisely what is protected by our first patents.

This is essential because the security of governments, banks, corporations, consumers and in fact all citizens depends on the use of secure identification and authentication processes. Most identification services providers either do not check holograms nor other security devices, or do not disclose their authentication methods that are absolutely unsufficient to provide the required security.

We have successfully tested our methods and made further improvements to eliminate ambient light when necessary, to facilitate verification from any point of view, to verify security devices that are deformed (banknotes or textiles for example), etc. All these improvements have also been protected by patents.

A few very large international groups, but also ambitious start-ups, are discussing with us agreements that will allow them to acquire these major strategic positions in all businesses for which identification and authentication play an important role.

Our patented technologies enable gaining global leaderships in the following markets:
  • online identification (including KYC)
  • online payment, and optical security of bank cards,
  • electronic signature,
  • online and face-to-face voting,
  • access control to intranets, social sites and multimedia services,
  • control of access to the premises, reception of visitors, delivery men, etc.,
  • control of use of vehicles, machines, connected objects, etc.
  • authentication of documents, powers of attorney, etc.,
  • e-mails messaging and telephony with an identified issuer,
  • protection against counterfeiting and grey markets,
  • protection against theft at points of sale and means of transport
    (cigarettes, spare parts, brown products, electronics , etc.),
  • protection against theft of personal objects and furniture, vehicle spare parts, bicycles, etc.,
  • protection of software licenses and video games,
  • etc.



Let"s make it simple


Authentication of a hologram requires:
  1. acquiring at least two images, either from two different locations or under two different lighting conditions,
     
  2. verifying that each of them is different from the other, to check that the marking is a hologram and not a photographic reproduction,
     
  3. and comparing at least one of these images with a reference corresponding to a similar point of view, to check it is the original hologram and not any other one.

    The reference may also be replaced by a combination of two or more references shot from neighbouring places.

Our main patent, which is granted in the USA as US9058535 and in Europe as EP2695147 protects this method when comprising the determination of the position of the smartphone in relation to the hologram by using the visual aspect of the hologram (e.g. distortion due to perspective).

The advantage is important as it enables the verification without any mechanical accessory.

- - -

A competitor who does not determine the position of the smartphone in relation to the hologram would not be able to offer reliable identification, and those who do not properly verify holograms will no longer be able to say they verify identity documents, which is what their customers are asking for.

Several applications claiming to verify holograms have appeared on the market, and not all of them perform the operation correctly. Others are infringing our patents, and they will have to stop their operations if they don't want to take the risk of being considered counterfeiters, and drag with them into this risk all their customers and users of their services.

To know more about our patents, please visit the Patents section of this site.







Brute Force Resistant Technology





An innovative solution to a major challenge in the world of IT security

In an era where terrorist states like Russia will start utilizing quantic computing to crack widely used encryption codes such as RSA and Elliptic Curve Cryptography (ECC), it's time to take action. Using the computing power of quantum computing and advances in artificial intelligence, they can carry out brute force attacks that threaten the security of the Internet as we know it.

This jeopardizes all our encrypted communications, including the most sensitive ones: digital identities, online banking transactions, and government communications.

There are various approaches to combat this threat, from adopting quantum-resistant algorithms, increasing key lengths, to exploring post-quantum cryptography. However, these methods will probably not be implemented broadly and timely.

We am excited to announce that we have recently filed patent applications for a new innovative method to resist decryption attempts by brute force. It's simple, effective, and can be deployed immediately.

We invite you to discover on LinkedIn this innovation that could revolutionize our understanding of digital security!

French version

Latest News

PowerPoint Presentations
- English version.
- French version.

We just published: