Synergistic Solutions – Anonymous ID Smart Card and Secure Voting System

The purpose of this page is to present and discuss two proposals, with the intention of providing viable solutions regarding the following issues:Protection of privacy

Prevention of identity theft

Preventing voting fraud

Controlling illegal immigration

Enabling a fair flat tax system

The two proposals are outlined as follows:

Anonymous ID Smart Card

front.jpg

The card contains multiple smart chips, as described below. Each chip is shielded from external scanning, and embedded in a mesh of wiring that is appropriately delicate so that any attempt to remove a chip will result in all chips being immediately erased and made inoperable. The card will be provided with a transparent protective sleeve or case.

Output to the card’s screens will be limited to non-executable text and pixel coding. Downloading and activation of executable files will be limited to an optional auxiliary unit that communicates with the card’s wireless chips but not with its screens or other chips.

The set of chips provides the following capabilities, which may each be on a separate chip or combined on a single chip where feasible:

A personal data chip that after being embedded into the card provides no output except hardwired output to the card’s screens and that accepts no input except from the touchscreen keyboard or Owner-activated download of data appearing on the frontside screen from the wireless chips. Data on the personal data chip is input by the card manufacturer prior to the chip being embedded into the card and using equipment that is certified to copy data provided by the card Owner (on a CD or other media) onto the chip without making any other recording of the data. This data includes the card Owner’s personal data, such as biometric data; financial, insurance, and health records; citizenship and voter status, driver’s license information, other licenses and certifications, etc.Commercial transaction chips are provided to the card manufacturer by the Owner’s financial institutions, and contain software that generates encrypted codes for financial transactions. In brief, the software will display an encrypted sequence that when transmitted by the seller to the financial institution will credit the seller’s account in the amount of the transaction. The Owner’s identity is protected by encryption of the Owner’s account number in the transmitted sequence, with no other identifying information included. The account number will be encrypted into a new sequence at each transaction, so that decryption of one transaction by a third party could not be used to make another transaction. In conjunction with the wireless authenticated server-based chip, the card’s front screen would display each financial institution’s bid for the Owner’s business by showing the terms offered for each transaction.

Secure Access chips are provided to the card manufacturer by the Owner’s employer(s) or other parties requiring secure access by the Owner. Only such information as required by the secure facility and authorized by the Owner will appear in the encrypted access code displayed on the backside screen of the card.

With a court order, commercial transaction chip suppliers and secure access chip suppliers may be required to include encrypted Owner identification and location tracking in the transaction code. This would apply to parolees, repeat offenders, non-citizens, and where appropriate to individuals under investigation for illegal activity. Without such a court order, in a commercial transaction the card Owner always remains anonymous; the seller in a commercial transaction needs only the encrypted transaction code, which will verify that the card is authentic, that the card holder is the Owner, and that the seller’s account will be credited in the amount of the transaction. References herein to display of information on the card’s screens do not include court-ordered tracking information.

The card Owner’s biometric data are contained in the personal data output-only chip, and is not in the possession of the government or business institutions. The card itself has embedded biometric sensors that authenticate the holder as the Owner of the card. This is essential for the protection of private information and to alleviate concerns about Orwellian abuses by the government and others. The biometrics industry cannot rely on Americans lining up to have their biometric information recorded by the government or anyone else; keeping this information solely in the hands of the Owner will enable acceptance of the protection offered by biometrics to all parties.

The Owner authentication includes a thumbprint sensor (as well as a forefinger-print sensor on the back), a voice-recognition/password system, and a face, retina, and dental recognition system (camera and LEDs). The password system will include as many password prompts as the Owner chooses to add, including authenticating responses as well as non-authenticating responses that will trigger a silent alarm (to be used if under duress). The thumbprint sensor will also contain an alarm capability activated by thumb pressure above a certain threshold.

The screen shows all output from all chips, for approval by the Owner prior to transmission.

The backside screen (below) displays only encrypted commercial transaction or security identification codes. For reasons of privacy and security, this code is not transmitted electronically, rather it is optically scanned directly from the backside screen by the camera on the backside of the seller’s card. All communication between the Owner’s card and the seller’s/security agent’s card is made exclusively using the screens and cameras on the back of each card. All details of the transaction are also displayed on the frontside screens of both cards.

back.png

Other uses for the Anonymous ID Smart Card include:

A traveler’s ID card to facilitate movement through commuter lanes, public transportation, airports, and other transportation facilities.

A Voter Card, in conjunction with a Secure Voting System.

Recording the Owner’s residential and business zip codes for each commercial transaction for redistribution of sales tax collected. This will provide funding for public services and infrastructure in areas with limited retail tax revenues, and facilitate the replacement of personal income taxes with sales taxes, which of course would keep the IRS out of our lives.

An advanced version will perform as the ultimate portable personal computer, with additional chips for wireless authenticated and unauthenticated (anonymous) access to both server-based networks and peer-to-peer networks , which will allow numerous other applications, such as an access system for online school textbooks and classroom presentations, and for class notes. Envision on each school desk a tablet screen with a receiver for the smart card, on which the student could make notes and submit questions, and record the entire session for later review.

Please continue to Secure Voting System and/or return to Synergistic Solutions to make comments.Thank you,

Ben Goodman

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: