proposal for skim shieldskimblock.com/pdf/skimshieldproposal-eng.pdf · 2. benefits of skim shield...

4
Orient Computer Co., Ltd. Pioneer in total data security, software and hardware Proposal for SKIM SHIELD® -- Protect sensitive data from skimming attacks in the mail -- Company confidential

Upload: others

Post on 18-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Proposal for SKIM SHIELDskimblock.com/pdf/SkimShieldProposal-Eng.pdf · 2. Benefits of SKIM SHIELD Prevents information leakage in skimming attacks Design your own SKIM SHIELD Show

Orient Computer Co., Ltd.

Pioneer in total data security, software and hardware

Proposal for SKIM SHIELD®-- Protect sensitive data from skimming attacks in the mail --

Company confidential

Page 2: Proposal for SKIM SHIELDskimblock.com/pdf/SkimShieldProposal-Eng.pdf · 2. Benefits of SKIM SHIELD Prevents information leakage in skimming attacks Design your own SKIM SHIELD Show

1. What is SKIM SHIELD?When you mail a credit card, driver's license, or other contactless IC card (RFID card), do you notice how attractive a target it makes for skimming* attacks? Even in registered mail, a thin paper envelope calls out, " Please steal my private information using a skimmer." But if a SKIM SHIELD, made with Orient's SKIM BLOCK*, holds the card during mailing, your customer's sensitive information is protected against skimming.

SKIM SHIELD Proposal ①

What is skimming?

Skimming includes illicit detection and copying of data from contactless IC cards (RFID cards), often by a device that can fit in a pack of cigarettes. For example a criminal could sneak onto a crowded subway with a skimmer in his pocket, and read data from IC cards in everyone's purses and wallets. Unlike ordinary crimes, the stolen goods are data, so usually the victim isn't even aware of the theft until it's too late. Crowded areas are ideal locations for

skimming crimes.A skimmer: the size of a pack of cigarettes

● Personal information● Money management● Various ID cards, etc.

ordinary carriers

Abuse ofcard data

Skimmer

-- Using ordinary carriers --

An ordinary card carrier makes it easy to steal data.

* The photo includes a sample IC card. The paper carrier behind it is an actual SKIM SHIELD.

Skimmer

● Personal information● Money management● Various ID cards, etc.

SKIM SHIELD

Skimmingis blocked

-- Using SKIM SHIELD --

The carrier blocks skimming and protects data.

SKIM BLOCK is a sheet of fabric developed by Orient Computer to prevent skimming. It can be used in manufacturing all kinds of products to prevent skimming. Orient was the first Japanese maker to obtain U.S. government approval under the FIPS 201 standard.

FIPS201Approval NO.180

FIPS201Approval NO.174

Patent application 2005-185409 Patent 2007-020592Patent application 2006-110140 Patent 2007-287752

Patents and Trademarks

F I PS i s a s e r i e s o f standards published by the U.S. government concerning information processing. Orient's SKIM BLOCK was the first Japanese product to be approved under FIPS 201.

SKIM BLOCK is covered by Orient Computer's patents, patent applications, and trademark. Patent applications are also pending in Europe and the United States.

Protects data from skimming while cards

are in the mail.

You can make your own SKIM SHIELDS

by printing them with any design you like.

After a SKIM SHIELD reaches its destination,

your customer can use it as a SKIM BLOCK card.

Eco-friendly design uses paper as its main

ingredient, producing much less CO2 than

plastic.

Page 3: Proposal for SKIM SHIELDskimblock.com/pdf/SkimShieldProposal-Eng.pdf · 2. Benefits of SKIM SHIELD Prevents information leakage in skimming attacks Design your own SKIM SHIELD Show

2. Benefits of SKIM SHIELD

Prevents information leakage in skimming attacks

Design your own SKIM SHIELD

Show your stance on security

SKIM SHIELD Proposal ②

More and more kinds of data cards will be converted to use ICs.Which of your cards will use SKIM SHIELD?

Protection from information leakage is an offer that no company can refuse. There is no such thing as too much leak prevention. Your company's fate might depend on personal or sensitive information. Internal corporate security can vary, but SKIM SHIELD may be described as your strongest protection against skimming crimes in the mail.

You can print SKIM SHIELD as easily as paper, with your company's logo or other original design. The combination of your company's creative products with the functionality of protecting IC cards from skimming can add to their appeal.

By casually including an explanation of the effectiveness of this anti-skimming measure, your company shows its position on security. As a company handling its customers' personal information, this is an opportunity to show that you care. As well, this is a chance to show that you provide better service than other companies that fall behind. (This is particularly important to companies that deal with large amounts of personal information.)

-- SKIM SHIELD works on IC cards in the 13.56 MHz range. --

VISA Card AMEX Card JCB Card

ATM CardFare Card

Master Card

National ID Card

Highway Toll Card Driver's License

PassportCompany Badge Various Prepaid Cards

Page 4: Proposal for SKIM SHIELDskimblock.com/pdf/SkimShieldProposal-Eng.pdf · 2. Benefits of SKIM SHIELD Prevents information leakage in skimming attacks Design your own SKIM SHIELD Show

In order to show the effectiveness of SKIM SHIELD, we tried to make an IC card reader read an IC card under the following conditions. (1) Not inserted in either a carrier nor envelope; (2) Inserted into an ordinary card carrier and an envelope; (3) Inserted into SKIM SHIELD and an envelope. Results are easily seen.

3. Demonstration of SKIM SHIELD

SKIM SHIELD Proposal ③

1. We equipped a PC with a card reader and utility software.

2. When we put an IC card on the card  reader, it read the card.

3. Software showed the information  recorded in the card.

4. We prepared a SKIM SHIELD card  carrier and an ordinary card carrier.

5. Next we put the IC card in the ordinary  carrier and inserted it into an envelope.

6. When we put the envelope on the card  reader, it read the card.

7. Software again showed the information  recorded in the card.

8. Finally we put the IC card in a SKIM SHIELD and inserted it into the envelope.

10. The card reader tried to read the data. 11. However, no data could be read.

9. We put the envelope on the card  reader and tried to read the card.

PC & utility software

Cardreader

SKIM SHIELD

SKIM SHIELD

Ordinarycard carrier

Ordinarycard carrier

IC cardalone

* Performance of this experiment and its result can be seen on the web at http://www.skimblock.com or http://skimblock.co.jp .

We conducted this experiment with a card reader because a skimmer would be illegal. However, this result shows that an IC card could be read through an envelope with an ordinary carrier, but could not be read when SKIM SHIELD was present.

Balance remaining on card

Balance remainingon card