Biometrics and E-passports Lessons learned from established biometrics systems

Size: px
Start display at page:

Download "Biometrics and E-passports Lessons learned from established biometrics systems"

Transcription

1

2 Biometrics and E-passports Lessons learned from established biometrics systems The introduction of e-passports represents a profound technical accomplishment not only in the ID arena, but across several fields of technology. Rarely do we see such a rapid confluence of disparate and nascent technologies on such a large and global scale. Biometrics, contactless chips, encryption and data security, security printing and optical authentication all present significant technical challenges in their own right, but the necessity to solve these problems in a singular solution with an age-old form factor is truly a daunting task. Not only must solutions work properly, but they must achieve several layers of interoperability. This all must happen by Fall 2006, when U.S. laws require visa-waiver countries to begin issuance of e-passports for their citizens to continue to be exempt from requiring visas. E-passports represent the first true mass deployment of biometrics technology on a consumer product scale. Will e-passports be ready? Will they work as intended? As this paper is being written, signs point to yes for most countries. Some non-visa-waiver countries also have e-passport programs in progress. One fact is certain: the resulting cross-pollination of biometrics and smart card technologies has brought a remarkably accelerated learning curve for specialists in these disciplines. Those areas where the technologies intersect present some difficult challenges; some were anticipated as plans for e-passports were first placed on paper, and some were not. Today, the focus of the e-passport vendor community continues to focus on the challenges of physical layer interoperability between contactless chips and readers, as well as reducing the read times of contactless chips. Thanks to wellparticipated interoperability tests in Singapore in late 2005 and Berlin in June 2006, enormous strides have been made towards these challenges. Further progress has also resulted from trials conducted by the U.S. Government in the Spring of 2006, which involve the use of e-passports by people traveling through San Francisco with e-passports from several countries. It is expected that physical layer issues will largely be resolved by Fall 2006, when we will likely see the first e-passports cross U.S. borders in a non-trial environment. New challenges will arise, however, as the number of e-passports in use rises dramatically as expected in It is one thing to get a system of several hundred e- passports working smoothly in a controlled environment; it is quite another when several million e-passports are in use and unanticipated outliers begin to occur with more frequency. This paper takes an introductory look at four such challenges whose degrees of difficulty are more a function of scale than time, making them more difficult to model and anticipate. Nevertheless, they are issues that have been addressed before in the biometrics industry. After all, this is not the dawn of large-scale biometrics systems, but rather something of a reincarnation. Some consider the inception of modern, large-scale biometrics to be the digitization of millions of fingerprint card records by the FBI in the early 1990s to which matching algorithms could be applied in order to identify an individual by their fingerprints. Today, there are some fifty million fingerprint records in the U.S. FBI database, and many millions more in similar automated fingerprint identification systems (AFIS) around the world. A great deal has been learned in the development and evolution of these systems, and these lessons can be effectively applied to e-passport systems. Biometrics Enrollment for E-Passports 1

3 AFIS systems rely heavily on advanced algorithms running on high-performance hardware. But of equal importance in achieving sufficient levels of matching performance that is, low occurrences of false accepts and false rejects is image quality. Fingerprint images of poor quality result in poor matching performance. The same can be said for facial images, and for both verification and identification applications. Some e-passport systems will include collection of fingerprints for identity proofing upon enrollment and for storage of images on the e-passport. With the increased use of biometrics for identification, databases of biometric samples are growing exponentially. The more samples in the gallery database, the more data that is required in the probe sample being submitted for matching. In the case of fingerprints, this means more minutiae, which means more surface area, which means more fingers. But border management applications require much faster enrollment times as little as ten seconds. This paper will discuss new technologies addressing this problem. the data with other large national systems (eg. Interpol, UK, RCMP, BKI). The system works because of strict adherence to data interchange standards. This same AFIS infrastructure must also rely on a robust networking architecture that enables reliable submission of these data files. Local police that submit files to an AFIS must be confident that their files are received, and that any network outages do not result in an interruption or loss of work. E-passport systems will similarly require the submission of biometric files across a network from remote registration stations to a centralized personalization center and/or background check system. Issue #1: Biometric Image Quality A primary driver for the transition to e-passports is the use of biometrics to prevent their fraudulent creation or use. Biometric facial and fingerprint images stored digitally in the e-passport memory will be extracted upon a border crossing attempt and then compared either visually or electronically to a live picture of the individual. It is in this way that border management officers can better ensure that an individual is indeed the person they are claiming to be and have participated in a proper passport issuance process. For images to be proficiently used for biometric applications, they must 1) conform to specific requirements and 2) be of sufficient quality. Specific requirements of biometric images are included in biometric data interchange format standards defined by the ISO/IEC SC 37 Biometrics standards group. For example, facial images must be compressed with either JPEG or JPEG2000 and cannot be compressed above a certain ratio; ICAO recommends a file size between 12 and 20 Kbytes. Facial images must also meet a minimum resolution requirement. More subjective characteristics are also either required or recommended by ICAO. These Figure 1. Facial Image and Optimized Facial Image AFIS systems such as the FBI IAFIS are actually large interconnected networks of machines that collect, route, archive finger images, match finger templates, and exchange messages. They rely heavily on the interchange of data files; more specifically the exchange of fingerprint image transaction files. The data is collected and searched in a hierarchical fashion from local databases first, then at the state level, then at the FBI. The FBI also exchanges 2 Biometrics Enrollment for E-Passports

4 include subject pose and orientation, facial expressions, headwear, lighting, shadows, and bright spots. ICAO recommends horizontal eye positions and pre-location and identification of eye locations. Biometrics systems rely on image quality on two sides 1) the capture and storage of the biometric image upon enrollment, and 2) the capture of a live image upon a border crossing attempt. While there might be several chances to improve the quality of the biometric upon the border entry attempt (though this is less desirable for efficient throughput purposes), enrollment presents but one chance to capture and store a high quality biometric image onto the e-passport. If enrollment images are of poor quality, an individual might always have problems achieving a match. One can imagine their frustration during what can already be mildly stressful encounter. It is absolutely critical to store highquality images on the e-passport; matching algorithm providers will continue to do their part to improve matching performance, but there is little that can be done when images on deployed e-passports are of poor quality. a federal employee ID application, the U.S. government has recommended use of JPEG2000 region of interest compression, with the facial region compressed to a ratio of 24:1. Upon capture, the photographer needs specific guidelines for setup of the photographing environment and positioning of the subject. SC 37 has recently drafted a document (NI511) providing recommended environmental conditions for facial photo capture. Image processing can be performed to further automate this process. Software available from several vendors can be used to find eye locations, and also to align, scale, and crop the image, and optimize contrast, so that operators can spend less time preparing a subject for a photo. Software applications can be used to check the image for potentially non-compliant features, such as yaw, hot spots, shadows, smiles, low brightness and contrast, incorrect image geometry, improper head position, a cluttered background, and poor focus. The guidelines and quality requirements for digital facial images developed by ISO/IEC are influenced by the anticipated use of facial matching technology by certain countries. Matcher performance is greatly improved if the facial images conform to a specified set of dimensional and quality requirements. ICAO standards recognize the importance of storing biometric images as opposed to templates. The need for digital facial images stored within these documents is readily apparent, but it is somewhat less obvious that digital fingerprint images should also be stored where this secondary biometric is implemented. While results of the NIST MINEX tests published in April 2006 illustrate that minutiae data is currently interoperable between several vendors, only images provide true interoperability between all vendors. Even though finger minutiae data interchange formats are standardized, certain aspects of template extraction and matching techniques are proprietary to each vendor; minutiae extraction is typically tuned to maximize the performance of proprietary matchers. Consequently, anything other than the proprietary template may diminish the accuracy of a given matcher. What can be done to help? Facial images stored on e-passports should conform to the ISO/IEC standards to the greatest degree achievable to ensure that they will be useful for visual or electronic matching to a live photo at a border checkpoint. It is recommended that facial images be compressed to between 15 and 20 Kbytes in size, and are non-compliant if smaller than 12 Kbytes. As an example, for Figure 2. Poor and Good Fingerprint Images, Scoring 14 and 81 Respectively Score = 14 Score = 81 Biometrics Enrollment for E-Passports 3

5 As with facial images, fingerprint images must also be compliant with ISO/IEC guidelines. They should be compressed in compliance with Fingerprint Image Data Interchange Standard ISO/IEC , at Image Acquisition Setting Level 31, as described in Table 1 of the standard. This specifies use of WSQ compression at 500 ppi resolution and 8 bits pixel depth, or 256 gray levels. WSQ is a wavelet-based compression technique optimized specifically for 500 ppi fingerprint images. Fingerprints compressed using WSQ should be compressed to a size no smaller than 1/15 the original size. For a one-squareinch image, this translates to about 16.7 Kbytes in size. The e- passport standard recommends a minimum compressed fingerprint image file size of 10 Kbytes, which translates to about 0.75 square inches. According to NIST IR 7201, fingerprint images should be no smaller than 320 x 320 pixels in size. Ideally, only fingerprint scanning equipment certified by the FBI should be used for creating fingerprint images. A list of certified equipment is posted at gov/hq/cjisd/iafis/cert.htm. of the image, identify non-compliant features, and assign quality scores, which attempts to correlate to the behavior of the image in a matching environment. These applications analyse the image to quantify features known to correlate to good performance, such as good ridge flow and contrast in the case of fingerprints. They can also be used to process the image to automate the capture process and ensure compliance. Issue #2: Fingerprint Enrollment Efficiency The amount of fingerprint data required from each enrollee is increasing dramatically as search databases grow, while the time to collect the data and the required skill level of operators needs to go down. Consider that AFIS systems were designed primarily for criminal applications, where the criminal suspect enrollee has nothing but Figure 3. Tenprint capture using slap scanner and image processing software time, and a highly-skilled police officer is the most typical system operator. For civil applications such as e-passports, a long line of enrollees at a passport center is a more typical environment, with lower skilled operators. For visitor screening at passport stations, the U.S. Government is targeting a maximum enrollment time of only fifteen seconds to collect a full set of ten flat fingerprints. What can be done to help? Advanced fingerprint image processing technology is answering the call for this difficult requirement. Instead of collecting rolled fingerprints, new fingerprint slap scanners can be used to collect three images as biometric input: 1) right hand slap, 2) left hand slap, and 3) dual-thumb slap. The first step in the processing of each image is the segmentation and identification of In summary, the quality of facial and fingerprint images should be assessed upon capture to ensure their usefulness in a matching environment and to screen images to ensure that databases are not burdened with large numbers of low quality data. Low-quality images stored on e-passports will likely cause the owner grief upon their future border crossings. Software applications are commercially available that perform an analysis 4 Biometrics Enrollment for E-Passports

6 the individual fingertips. Once the individual fingertip locations have been identified, the results are used to define bounding boxes. NIST has recently defined new standards to enable transport of these three images with bounding box information in a standard-compliant Type 14 EFT data interchange file, as defined by ANSI/NIST ITL Each finger is analyzed for quality and sequenced against all other fingers to identify possible misplaced fingers. When the user has a series of images that satisfy certain input criteria (sufficient quality, properly placed, properly sequenced), the images are compressed with WSQ for storage and/or transmission. The compressed images are then stored with required demographic data in the ANSI/NIST data interchange file and transmitted to a central archive for storage or to an agency for processing. A final optional step is the printing of the ANSI/NIST file for hardcopy storage or review. Issue #3: Data Interoperability When receiving an e-passport upon a border crossing attempt, e-passport readers will be used to collect and parse data from files stored in the e-passport memory chip during the personalization process. The logical data structure, or LDS of these files is defined by ICAO standards for the e-passport. The LDS is essentially a series of files, or Data Groups that each contain biographic data and/or biometric images such as the face or finger prints. Data Group DG1 contains biographical MRZ data found on traditional passports, such as ANSI/NIST Compliant File name, nationality, date of birth, and passport number. DG2 contains a facial biometric image and associated data. The optional DG3 contains one or more fingerprint images. The biometric image data groups are specified ISO/IEC SC 37 in the ISO/IEC x biometric data interchange file format standards, and referred to by the ICAO LDS. The data interchange file is wrapped in what is called a CBEFF header defined by ISO/ IEC Some of the ISO/IEC biometric data interchange formats are derived from legacy standards. For example, fingerprint image files have been submitted by enrollment workstations to AFIS using similar standards for many years. In the U.S., state and local police have submitted fingerprint files via an -based store and forward system to the FBI IAFIS fingerprint database via its CJIS WAN in large volumes since The ANSI/ NIST ITL Data Format Figure 4. ANSI/NIST File Type 1 Record Transaction Information (1) Type 2 Record Demographic Data (1) Type 10 Record (JPEG) Mug Shot, Scar, Tattoo Images (1-N) Type 14 Record (WSQ) 2 Slap, 1 Dual Thumb Images for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo standard has been strictly adhered to for this application. As a result, a great deal has been learned about the issues and challenges of a largescale system relying on biometric data interchange formats for proper operation. Interestingly, even given the strict compliance requirements for fingerprint image file submission to the FBI, non-compliant file submissions still occur. Perhaps this is less surprising given the fact that several thousand such files are submitted to the FBI every day from many distant locations using equipment designed and provided by different vendors. Files with missing data, incorrect field content, or with poor quality image data are often the result of human error or improper interpretation of the standard. In each case, the FBI must reply to the sender with a message that conveys the problem. It can be considered a natural and unavoidable occurrence in a Biometrics Enrollment for E-Passports 5

7 Figure 5. ICAO Logical Data Structure (LDS) Name Nationality DOB Sex Issuing State Document No. Date of Expiry ICAO Logical Data Structure (LDS) MRZ Data ISO SC 37 ISO SC 37 JPEG/JPEG2000 Compressed CBEFF/ FACIAL IMAGE DATA FORMAT WSQ Compressed CBEFF/ FINGERPRINT IMAGE DATA FORMAT 3) It is expected that with a new version of the LDS will come use of three Data Groups reserved to hold data written to the e- passport by a receiving state. Receiving states would then be tasked with establishing interoperability in the reverse direction, essentially doubling the size of our interoperability matrix. 4) There are several different options for securing the data on e-passports. Each algorithm must be supported by readers. high-traffic-volume system that includes a large degree of human interaction; it is manageable thanks to a thoroughly defined, strictly followed data interchange standard. Imagine a scenario with just one nation implementing an e-passport system. Several remote registration workstations might be used to collect and submit the data to a centralized personalization center. Then, upon departure and return of individuals, the files on their e- passports must be successfully read by e-passport readers at the border checkpoint. Given that the responsibilities to produce and read e- passports will typically fall under the jurisdiction of different government agencies, it will be necessary for these agencies to coordinate efforts to ensure data interoperability between the personalization and reader systems. Such a scenario presents similar challenges addressed by software in AFIS with success. While the e-passport data interchange standards allow for considerably more flexibility in what data can be included in a file, this problem can be reasonably addressed. Of course, not just one country but as many as one hundred countries or more will eventually be writing and reading e-passports. Considering a writer and reader for each participant in the worldwide e-passport arena, the size of the interoperability matrix is a mindboggling. With just 50 countries writing and reading e-passports, we have 2500 different read/write cases in an interoperability matrix. With 100 countries, the size of our matrix balloons to 10,000. There are further complications: 1) Plans to update the ICAO LDS standards are already on the drawing board; a Version 2 of the LDS could be in use as soon as Both Version 1.7 and Version 2.0 would both need to be read by e-passport reader systems. 2) Legislation has been enacted by the European Union to require the placement of fingerprint image biometrics on e-passports by This will require the inclusion of a new LDS DG 3 to e-passports. The scale of the problem is considerable, and unlike physical layer interoperability challenges, can be expected to get worse with time and scale, not better. What can be done to help? Like an AFIS-based system, an e- passport system will in some cases require the submission of biographic data and biometric image files from remote registration workstations to a centralized personalization center. It will be crucial to validate the compliance of the file data upon registration; this way, any errors in data creation can be identified. On the reader side, e-passport reader workstations need to flexibly handle both multiple versions of LDS files as well as non-compliant interpretations of the LDS standards. These workstations should be equipped to quickly and easily ingest modifications to accommodate new versions of e-passports or non-complaint e-passports as responsibilities become aware of them. 6 Biometrics Enrollment for E-Passports

8 The data interoperability challenge will always be present and will require perpetual care. A permanent interoperability testing infrastructure will need to be put in place and maintained. A registry of e-passport data files maintained by ICAO might be a useful tool. Issue #4: Robust Networking AFIS rely on a robust networking architecture that enables reliable submission of thousands of data files daily from thousands of workstations. Local police that submit files to an AFIS must be assured that their files are received, and that any network failures do not result in an interruption or loss of work. E-passport systems will similarly require the submission of biometric files across a network from remote registration stations to a centralized personalization center and/or background check system, and can also significantly benefit from such a robust network. What can be done to help? The FBI IAFIS as well as many similarly large AFIS around the world rely on a secure based store-and-forward network architecture to ensure that files are received and whose status can be easily checked and verified. Web Services is the more typical technology of choice in newer systems. As described above, biometric data files are created at remote workstations for submission to the AFIS. A store-and-forward system attaches these files to an or generates a Web Services message at the remote workstation and stores it at the local store-and-forward server. If there are multiple Client Workstation Web Browser workstations at a given site, then these utilize the same server. This local server then forwards the files to a centrally located server, which serves as a single point of contact between the entire agency and the IAFIS. It also serves as a single point of inquiry as to the status of each transaction submission. The IAFIS sends reply messages back through the store-and-forward to the remote workstations that indicate status. Following are some store-andforward network benefits: Figure 6. Biometric Store-and-forward Status Query Status Reply centralized control of the enrollment process and visibility into system-wide performance and trouble spots implified submission and reception of transactions by reducing the number of clients that must interface directly with the database or matching system. It is often a requirement of large centralized systems that submissions from disparate systems be aggregated to a single communication link. TRANSACTION SERVER Store and Forward AFIS/ ID Personalization redundancy with temporary backup storage of transactions, ensuring that transactions submitted by a particular client are never lost and will eventually be received and processed by the matching system, even in the event of a network failure. less ambiguity as to the status of a submitted transaction, providing assurance and guidance to a workstation operator. immediate feedback and troubleshooting information to a workstation operator in the event of problems with transaction submissions or responses. Biometrics Enrollment for E-Passports 7

9 In Summary Large-scale biometrics systems such as AFIS have been in use with great success for many years, and provide valuable lessons to developers of e-passport systems. Image quality, enrollment efficiency, data interoperability, and robust networking are challenges that have been addressed in AFIS, and should also be addressed in e-passport systems. Anticipating these issues early in the development of e-passport systems will significantly reduce risks and costs associated with fixing problems after systems have already deployed. For more information and white papers, please consult the Aware website at or contact by at About Aware, Inc. Aware has been a leading provider of commercial off-the-shelf (COTS), standardsbased biometric software since Aware software products provide tools for OEM software providers and integrators to enable their own products with interoperable, standards-compliant, field-proven biometric functionality for applications from border management to criminal justice. Aware software enables standard-compliant compression and formatting of biometric data, with products such as WSQ1000 for fingerprint image compression, NISTPack for ANSI/NIST-ITL (FBI, Interpol, UK, DOD, RCMP, etc.) submission to government databases, ICAOPack, PreFace and M1Pack for biometric Epassport and ID card compliance. Aware offers quality assurance software that enables the assessment of biometrics prior to storage and submission as well as software for the printing of demographic data and fingerprint images in user defined card layouts. Aware s suite of software tools are used by federal, state, and local government agencies around the world, including the FBI and other U.S. Department of Justice agencies, the U.S. Department of State, the INS (Department of Homeland Security), and several agencies throughout Europe, Asia, and South America. Aware is headquartered in Bedford, Massachusetts, and has approximately 120 employees. Aware is a publicly traded company on the NASDAQ Stock Exchange (symbol: AWRE). Aware, Inc. 40 Middlesex Turnpike Bedford, MA T F E marketing@aware.com w The information presented in this document is designed as an introduction to the Aware suite of biometric tools. If you would like further information, extended examples, or product manuals please contact Aware at: help@aware.com wp_bioepassports_rev1_0506 Copyright 2006 Aware, Inc. All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form by any means, electronic, mechanical photocopying, recording, or otherwise without the prior written permission of Aware, Inc. This document is for information purposes only and is subject to change without notice. Aware, Inc. assumes no responsibility for the accuracy of the information. AWARE MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Aware is a registered trademark of Aware, Inc. Other company and brand, product and service names are trademarks, service marks, registered trademarks or registered service marks of their respective holders.

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS

REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS W H I T E PA P E R H a r d w a r e O b s o l e s c e n c e M a n a g e m e n t i n t h e B i o m e t r i c s I n d u s t r y REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS Copyright

More information

6 facts about GenKey s ABIS

6 facts about GenKey s ABIS 6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every

More information

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data INTERNATIONAL STANDARD ISO/IEC 19794-4 First edition 2005-06-01 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données

More information

Mobile ID, the Size Compromise

Mobile ID, the Size Compromise Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption

More information

Biometric Sample Quality Standards Importance, Status, and Direction

Biometric Sample Quality Standards Importance, Status, and Direction Biometric Sample Quality Standards Importance, Status, and Direction David Benini Aware, Inc. INCITS M1 Project Editor Biometric Sample Quality ISO/IEC SC 37 Project Editor Biometric Sample Quality Standard

More information

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data INTERNATIONAL STANDARD ISO/IEC 19794-4 Second edition 2011-12-15 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments: From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 18013-2 First edition 2008-05-15 Information technology Personal identification ISO-compliant driving licence Part 2: Machine-readable technologies Technologies de l'information

More information

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO 1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it

More information

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance Overview Current generation of epassports Benefits and Limits of an epassport Overview of the next generation epassport Applications

More information

Biometric Enrolment for the European Visa Informationsystem (VIS)

Biometric Enrolment for the European Visa Informationsystem (VIS) Biometric Enrolment for the European Visa Informationsystem (VIS) German Experiences 1 EU Visa Information System (VIS) Federal Foreign Office Visa Application EU VIS Border Police Border Control Territory

More information

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems. White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

Whitepaper: GlobalTester Prove IS

Whitepaper: GlobalTester Prove IS Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.

More information

Registry of USG Recommended Biometric Standards

Registry of USG Recommended Biometric Standards Registry of USG Biometric Standards Version 1.0 DRAFT for Public Comment NSTC Subcommittee on Biometrics and Identity Management February 4,2008 1. Introduction This Registry of USG Biometric Standards

More information

Interview with Fernando Podio Chair of ISO/IEC JTC 1 SC 37 Subcommittee on Biometrics

Interview with Fernando Podio Chair of ISO/IEC JTC 1 SC 37 Subcommittee on Biometrics Interview with Fernando Podio Chair of ISO/IEC JTC 1 SC 37 Subcommittee on Biometrics In addition to his chairmanship of SC37, Mr. Podio is a member of the Computer Security Division of the Information

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data INTERNATIONAL STANDARD ISO/IEC 19794-9 First edition 2007-03-01 Information technology Biometric data interchange formats Part 9: Vascular image data Technologies de l'information Formats d'échange de

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER

INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA 95035 1 INTRODUCTION The fingerprint-imaging segment of the biometrics

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Information technology Biometric data interchange formats Part 5: Face image data

Information technology Biometric data interchange formats Part 5: Face image data INTERNATIONAL STANDARD ISO/IEC 19794-5:2005 TECHNICAL CORRIGENDUM 2 Published 2008-07-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE

More information

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD THE TRUST IMPERATIVE E-Passports are issued by entities that assert trust Trust depends on the

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

Lumidigm Frequently Asked Questions

Lumidigm Frequently Asked Questions Lumidigm Frequently Asked Questions PLT-02335, Rev. A.1 July 2015 Software Version 5.30 hidglobal.com Copyright 2014-2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. This document may not

More information

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification AAMVA UID9 Biometric Identification Report Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification Final Report Copyright 2003 International Biometric Group Version Description

More information

Introduction Morpho The Art of Identification

Introduction Morpho The Art of Identification Introduction Morpho The Art of Identification by Adriaan Kamphorst, Sales Manager Morpho Identity Documents Safran group businesses Aerospace Defense Security Morpho strengthens Safran s positioning to

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions

Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions Zia Saquib Executive Director, C-DAC Mumbai & Elec. City saquib@cdac.in Santosh Kumar Soni Sr. Staff Scientist,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data INTERNATIONAL STANDARD ISO/IEC 19794-2 First edition 2005-09-15 Information technology Biometric data interchange formats Part 2: Finger minutiae data Technologies de l'information Formats d'échange de

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

Biometric Standards for DoD Operational Requirements

Biometric Standards for DoD Operational Requirements Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric

More information

SUPREMA LiveScan Solutions. June 2009

SUPREMA LiveScan Solutions. June 2009 SUPREMA LiveScan Solutions June 2009 Live Scan System Suprema Live-scanner Solution based on advanced optical technology and state-of-the-art software technology for fast capture and high quality is an

More information

NIST Tests Supporting Biometric Identification Applications

NIST Tests Supporting Biometric Identification Applications NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005 Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format Robert Yen DoD Biometrics Management Office October, 005 Agenda Biometric Standards ANSI INCITS Fingerprint Standards vs. SC 37

More information

CBEFF. Common Biometric Exchange Formats Framework. Catherine Tilton. 6 March W3C Workshop on SIV

CBEFF. Common Biometric Exchange Formats Framework. Catherine Tilton. 6 March W3C Workshop on SIV CBEFF Common Biometric Exchange Formats Framework 6 March 2009 Catherine Tilton What is a CBEFF? CBEFF describes a structure and set of metadata elements necessary to support exchange of biometric information

More information

Document reader Regula 70X4M

Document reader Regula 70X4M Document reader Regula 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses and other identification

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

Advances in Stand-off Biometrics

Advances in Stand-off Biometrics Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Doc 9303 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Approved by and published under the authority of

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

Single device test requirements for reliable CAN-Based multi-vendor networks

Single device test requirements for reliable CAN-Based multi-vendor networks Single device test requirements for reliable CAN-Based multi-vendor networks Peter P. Dierauer By building a system with an open device-level network, the system designer has the option to choose devices

More information

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:

More information

White Paper. Think BIG. Fusion of Biometric and Biographic Data In Large-Scale Identification Projects. Increasing Trust in Identification

White Paper. Think BIG. Fusion of Biometric and Biographic Data In Large-Scale Identification Projects. Increasing Trust in Identification White Paper Think BIG Fusion of Biometric and Biographic Data In Large-Scale Identification Projects Increasing Trust in Identification Introduction In the past ten years development and implementation

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Identification or Verification? Advanced Identification Technology

Identification or Verification? Advanced Identification Technology Identification or Verification? Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining

More information

Biometric Specifications for Personal Identity Verification

Biometric Specifications for Personal Identity Verification NIST Special Publication 800-76-2 Biometric Specifications for Personal Identity Verification Patrick Grother Wayne Salamon Ramaswamy Chandramouli I N F O R M A T I O N S E C U R I T Y NIST Special Publication

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

ORACLE ENTERPRISE COMMUNICATIONS BROKER

ORACLE ENTERPRISE COMMUNICATIONS BROKER ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP

More information

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds: Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal

More information

Department of Defense. Electronic Biometric Transmission Specification 8 DECEMBER Version 3.0 DIN: BIMA-STB-STD

Department of Defense. Electronic Biometric Transmission Specification 8 DECEMBER Version 3.0 DIN: BIMA-STB-STD Department of Defense Electronic Biometric Transmission Specification 8 DECEMBER 2011 Version 3.0 UNCLASSIFIED - DISTRIBUTION UNLIMITED Revision History Draft Version Date Document Status Participants/Comments

More information

SNARE Enterprise Agents Features

SNARE Enterprise Agents Features SNARE Enterprise Agents Features A Prophecy International Company Agents Centralized log management and analysis is essential to assuring the integrity of critical logs and achieving compliance with a

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 5: Face image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 5: Face image data INTERNATIONAL STANDARD ISO/IEC 19794-5 Second edition 2011-11-01 Information technology Biometric data interchange formats Part 5: Face image data Technologies de l'information Formats d'échange de données

More information

IBM TS7700 grid solutions for business continuity

IBM TS7700 grid solutions for business continuity IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection

More information

Using the Prototype TWIC for Access A System Integrator Perspective

Using the Prototype TWIC for Access A System Integrator Perspective Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage

More information

Mobile Fingerprint Authentication Solution

Mobile Fingerprint Authentication Solution Mobile Fingerprint Authentication Solution 1 BioSign 2.0 I WHY BioSign 2.0? WORLD S FASTEST SPEED WORLD S MOST ACCURATE ALGORITHM ROBUST PERFORMANCE OVER TIME FLEXIBILITY IN DESIGN 50ms* authentication

More information

On Premise. Service Pack

On Premise. Service Pack On Premise Service Pack 02.0.01 - This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Biometrics & Smart Cards In Use Today

Biometrics & Smart Cards In Use Today Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS

DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS A TRUSTED SOLUTIONS PROVIDER FOR GOVERNMENT Governments rely on Datacard Group to develop and deliver sophisticated

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric calibration, augmentation and fusion data Part 1: Fusion information format

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric calibration, augmentation and fusion data Part 1: Fusion information format INTERNATIONAL STANDARD ISO/IEC 29159-1 First edition 2010-09-01 Information technology Biometric calibration, augmentation and fusion data Part 1: Fusion information format Technologies de l'information

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Major Projects Directorate

Major Projects Directorate RCMP NPS-NIST Interface Control Document for Immigration External Contributors NPS-NIST ICD 2.1.1 Last Updated Date: 2015-10-28 Status: Edition prepared for AFIS Renewal WBS: SEB-011 Version: 2.1.1 Revision

More information

ebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT

ebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT ebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT INTRODUCTION 3 INTRODUCTION The launch of the GSMA s Embedded SIM Specification, together

More information

16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E

16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E www.supremainc.com 16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, 463-863, Korea T +82 31 783 4502 F +82 31 783 4503 E sales@supremainc.com 2014 Suprema, Inc. Suprema and identifying product names and

More information

NGI and Rap Back Focus Group Briefing

NGI and Rap Back Focus Group Briefing NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus

More information

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017

More information

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema. S a Whe en identification matters s Leading Innovation in Biometrics & Security SUPREMA Biometric Solutions for Mobile Contact: C t t Sales@supremainc.com 2016 a Rightsreserved Reserved 2016 a Inc. Inc.

More information

Verifying emrtd Security Controls

Verifying emrtd Security Controls Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting

More information

Redistributions of documents, or parts of documents, must retain the FISWG cover page containing the disclaimer.

Redistributions of documents, or parts of documents, must retain the FISWG cover page containing the disclaimer. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Disclaimer: As a condition to the use of this document and the information contained herein, the Facial Identification

More information

Understanding Fingerprint Biometrics

Understanding Fingerprint Biometrics TECHNICAL SPECIFICATIONS Understanding Fingerprint Biometrics A brief look at fingerprints, how they are processed and how the accuracy of a biometric system is measured. ipulse Systems 7/1/2014 CONTENTS

More information

World s Best Mobile Fingerprint Authentication Algorithm

World s Best Mobile Fingerprint Authentication Algorithm World s Best Mobile Fingerprint Authentication Algorithm Mobile Fingerprint Authentication Algorithm l 1 I WHY? I Performance The world s fastest, most accurate mobile fingerprint technology ever provides

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you

More information

National Biometric Security Project

National Biometric Security Project National Biometric Security Project Activity Update: 2003-2005 Biometric Consortium Conference 2005 National Biometric Security Project Mission Assist government and private sector organizations deter

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

OPINION ON THE DEVELOPMENT OF SIS II

OPINION ON THE DEVELOPMENT OF SIS II OPINION ON THE DEVELOPMENT OF SIS II 1 Introduction In an attempt to ensure that the second-generation Schengen information system SIS II complies with the highest standards of data protection, the Joint

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented.

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented. Annex to the Financial Services Businesses Handbook Using Technology in the Customer Due Diligence Process A.1. Technology Risk Evaluation 1. A financial services business must, prior to deciding whether

More information

Department of Defense. Implementation Guidance for Electronic Biometric Transmission Specification (DoD EBTS) December Version 1.

Department of Defense. Implementation Guidance for Electronic Biometric Transmission Specification (DoD EBTS) December Version 1. Department of Defense Implementation Guidance for Electronic Biometric Transmission Specification (DoD EBTS) December 2012 Version 1.0 BIMA-STB-GUI-13-001 This page intentionally left blank. i Implementation

More information

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Skybox Security Whitepaper January 2015 Executive Summary Firewall management has

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

HID goid Mobile ID Solution

HID goid Mobile ID Solution HID goid Mobile ID Solution Government ID Solutions It s Time for Mobile IDs HID Global is poised to lead this shift, providing the secure ecosystem needed to facilitate the provision of citizen IDs to

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information