The security features governing the security of an identity can be divided into three levels of security, i.e. Level 1 Security , Level 2 Security and Level 3 Security . The three levels of security, in combination, provide comprehensive security coverage for identities and related documents to ensure their validity and authenticity. These are typically used to protect identity information on crucial documents such as identity cards, driving licenses and passports to ensure originality and accuracy of the identities they represent. The diagram below illustrates the different levels of security and how they ensure complete security coverage of an identity.
Security levels
Level 1 Security SURFACE Data—Level 1 Security provides the lowest level of security. This basic security requirement is referred to as overt security printing methods. Overt surface level security features include using ultra violet, threads, watermarks, holograms, security designs, micro text, fibers and other discernible features into the paper substance or on its surface during the paper making process. These are complemented by applied security features, such as OVD's or iridescent stripes, heat sensitive ink, optical variable ink and various high end printing methods or technologies. Printed personalised data is a part of this level of security and are static in nature. With the easy availability of technology today, such security features have become more easily tampered or copied.
Level 2 Security EMBEDDED Data—Level 2 Security improves upon the physical security mechanisms of Level 1 Security by taking information protection to a covert and embedded level. This prevents casual intruders from gaining access to, for example, encoded confidential information inside an embedded chip or other means of encoding. Technologies at this level include smart chips, magnetic strips, Radio Frequency Identification, contactless chips or smart chips with embedded identity and biometric data. With the right tools, L2S schemes allows the capability to capture, register and authenticate document holders' identity information and, of late, biometric identity information. The encoded data is limited by the chip memory size and capability. A specialized access mechanism is required to obtain access to the relevant data source and write data onto the embedded medium.
Level 3 Security FORENSIC Data—Level 3 Security offers the security and integrity of information from the surface level by sight down to the infinitely complex and specialized L3S FORENSIC level. Essentially, L3S will provide as many security levels as needed for any situation by catering to visual inspection of documents as well as L3S FORENSIC checks on identity and security information not readily attainable or viewable unless accessed by FORENSIC tools with the correct levels of authorised access. The ability to apply multiple sub-levels of security is made possible by the concept of centralised and dynamic identity data management by which centralised and forensic security controls can be applied on top of the localised and limited security applications onto an identity document. Tampered and forged identity documents are exposed when centrally retrieved original data of the True Identity reveals discrepancies on the document as well as any latest real-time updated information such as current statuses of a person's identity profile.