Mobile ID, the Size Compromise

Size: px
Start display at page:

Download "Mobile ID, the Size Compromise"

Transcription

1 Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1

2 Presentation Plan The quest for increased matching accuracy. Increased adoption of Palm prints and 1000 PPI resolution Increased adoption of mobile ID Increased no. of projects; Early history ; Observations & Standards Standards explained A) PIV & Appendix F; B) Mobile ID best practices explained 3 rd Party tests and results: A) UIDAI; B) NIST Conclusions Questions? 2

3 The quest for increased accuracy: Palm print PPI Proven fact: Fingerprint/Palm print Image quality and size directly correlate to matching performance. Result: Law Enforcement around the globe is adopting devices with larger scanning areas and higher scanning resolutions to feed their AFIS. Examples (only). Adoption of / By Palm LS 1000 PPI LS UK Ident1/NPIA FBI or 2011 RCMP Norway PDMT

4 The quest for increased accuracy: Multi-Factor Identification 4

5 The quest for increased accuracy: Palm print PPI Increase in image quality True1000ppi L Scan 1000P VS. 500ppi re-sampled to 1000ppi 1000ppi L Scan 1000PX VS. 500ppi on L Scan 500P Main objective: increase ID accuracy Increase in scanning area / size 5

6 Mobile ID Definition: Rapid Mobile Identification w/ 2 fp against an AFIS Increasing demand and multiple applications: Mobile ID, Special Operative/forces, Forensic investigation, port police, border control, etc. Increasing offer: Mobile ID: Rapidly increasing demand Increasing quantity of projects: Rapid ID: Several US States/counties. Swiss Mobile AFIS, Police, Switzerland Lantern/MIDAS/Mobile ID, UK Mobile ID, PSNI, Northern Ireland 6

7 Mobile ID: Early History and Standards Result: Increased no. of public tenders and deployments. Requirements mainly driven by operational needs and the Officer s convenience/tolerance. Size, weight and usability (ergonomics, functionality) = main selectors 7

8 Mobile ID: Early History and Standards Observations: The contrast between no-mobility and mobility = positive But little to no benchmarking done on matching accuracy between devices and vendors. Few to no credible industry 3 rd party standards and best practices considered or reflected in evaluation criteria. Some earlier projects specified FBI PIV standard Was the only NIST / FBI standard related to mobile handheld devices. Since 2010 we have: NIST Mobile ID best practices and SAP levels. Under Appendix F certification, specifically for Mobile Identification scenarios. 8

9 Milestones of Image quality at FBI (FBI / NIST EBTS standard) the FBI has developed this standard for electronically encoding and transmitting biometric image, identification, and arrest data Major milestones for image quality evaluation FBI Appendix G 1995 FBI Appendix F 1999 FBI PIV 2006 FBI Mobile ID 2010 Interim image quality specifications Final image quality specifications with increased requirements Lower-level standard for one-to-one fingerprint verification New category within App. F for Mobile Identification 9

10 Mobile ID: PIV and Appendix F Standards What are the standards? There are two standards currently in use for fingerprints: Appendix F and PIV Appendix F has stringent image quality conditions, focusing on the human fingerprint comparison and facilitating large scale machine manyto-many matching operation. PIV is a lower-level standard designed to support one-to-one fingerprint verification. Certification is available for devices intended for use in the FIPS 201 PIV program. Reference: 10

11 FBI scanner certification categories PIV (Personal Identity Verification) For enrolment and ID authentication (mainly single finger scanners) Mobile ID For scanners capturing flat and rolled fingers in a portable acquisition station FBI scanner certification categories ID FLATS For scanners capturing flat fingers only in a 3.2 x 3.0 image capture area. Livescan For scanners capturing flat and rolled fingers in a 3.2 x 3.0 image capture area ID Verification = 1:1 Match Identification = 1:n Match 11

12 Mobile ID: FBI image quality requirements 4 Cert. Categories 2 Image Quality Standards PIV Appendix F PIV Identification Flats Livescan Mobile ID 12

13 Mobile ID: NIST Best Practice Recommendation NIST NIST stands for National Institute of Standards and Technology Body of standards recognized not only in the USA, but also worldwide In August 2009, NIST published «Mobile ID Device Best Practice Recommendation» Cross Cross Match Match Technologies 13

14 Mobile ID: Understanding SAP / FAP levels A mobile identification device is a livescanner viewed in the context of a portable biometric acquisition station SAP means Subject Acquisition Profile FAP = is the SAP for Fingerprint Set of characteristics concerning the capture of a biometric sample. Device capture dimensions It is Applicable to 3 biometric modalities: fingerprint (FAP), face and iris. The higher the SAP/FAP level value, the stronger the acquisition requirements FAP Levels Number of fingers Image quality specification 14

15 Mobile ID: SAP / FAP levels Verification Mobile ID Minimum SAP Level Source: Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information from NIST Cross Cross Match Match Technologies 15

16 Mobile ID: Operational Environment & Risk Level Risk levels according to NIST Severe risk levels imply that loss of life and/or property can result if accurate identification or verification is not made. A moderate risk environment is defined for those encounters with a subject with no or questionable identification. An officer cannot detain a subject for more than a limited amount of time without making an arrest. In this situation, it is necessary to quickly identify the subject or retain biometric information sufficient to verify the subject s identity at a later date. A mild risk environment is defined for those encounters where enrollment and identification data will be used at a later date. At that time the subject would be available for comparison to the data previously retained. Examples of mild enrollments include preparing for future logical or physical access control for a subject, or retaining one or more biometric images for verification in court while the subject is available. Verification examples include tracking a subject through the jail or court system using the retained biometric images. In these cases a failure to match would result in additional action to verify the subject s identity, primarily inconveniencing no one but the subject Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 16

17 Mobile ID: Understanding the function Enrollment (example: a complete civil or criminal booking) Identification (trying to determine the identity of someone): 1:n comparaison Verification (trying to validate the identity of someone): 1:1 comparaison 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 17

18 Mobile ID: SAP level for police work The case for SAP 30 We can safely assume that the risk factor would be moderate We also know what we are trying to achieve: identification So what do NIST Best Practices recommend for such a scenario? 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 18

19 19

20 Mobile ID: Capture dimensions of FAP levels Rolled impressions FAP 10 FAP 20 FAP 30 Flat impressions FAP 10 FAP 20 FAP 30 20

21 FAP Level Mobile ID: Conclusion on Size Compromise Certification category Specification Capture dimension (WxH) Number of simultaneous captured flat fingers FAP 10 PIV x mm x 16.5mm 1 FAP 20 PIV x mm x 20,3mm 1 FAP 30 PIV x ,3mm x 25,4mm 1 Direct correlation between Scanner Size and device FAP Level. The > the size, the > FAP level FAP 30 > and Image Quality level than FAP 10 or FAP 20 (Apx F vs. PIV) The > size = > Quality = > weight = > $ Size/Weight/Costs 21

22 UID study: Determining best authentication accuracy using fingerprints > 620 million people enrolled 22

23 The UID study The Size Compromise: 3 rd Party tests Unique ID Authority of India (UIDAI) overseeing largest biometric deployment in the history of mankind Stringent requirements + a certification authority to authorize devices + technologies UIDIA published study evaluating SAP levels corrolation to matching accuracy Results: «Amongst the 26 devices studies, the single finger unlabeled FRR (False Rejection Rate) for up to 3 attempts varied from 2% to 23%! Concretely, we have: SAP10 SAP20 FRR FAR FRR FAR FRR FAR FRR FAR Single finger, 3 attempts Which led UIDIA to conclude: «Larger sensors provided better accuracy than smaller sensors» 2012 Cross CONFIDENTIAL Match Technologies & PROPRIETARY FOR INTERNAL USE ONLY 23

24 The Size Compromise: UID Fingerprint accuracy study Test setup Proof-of-Concept studies in 8 states Period: Apr Jan Aadhaar holders (mixed by gender, age and place of living) 15 scanner models Factors investigated Different sensor technologies Different minutiae extractors Number of fingers Fingerprint quality Best finger analysis Network (availability, bandwidth, service provider, landline vs. mobile, reliability & latency factors across networks) 24

25 The Size Compromise: UID study results 25

26 The Size Compromise: UID study results Device impact on matching accuracy Large sensors (FAP 20 compliant) provide better accuraccy than smaller sensors (FAP10 compliant) Other findings Highlights Using Best Finger for authentication, FRR is much lower (up to 6 times) than using any specific finger Residents in years age group showed the best authentication accuracy. Senior residents (60+) had the highest rejection rates. Enrolment NFIQ is poor a indicator to determine the best finger 26

27 NIST study: Impact of fingerprint capture dimension on matching performance Test setup A. Probe set: randomly selected images from FBI platinum repository images with mated record images with non-mated record B. Cut images according to FAP levels 10, 20 and 30 (+ control image) Gallery of images

28 The Size Compromise: NIST, FAP level vs. accuracy FAP 10 FAP 20 FAP 30 FNIR / FPIR: False Non-Identification Rate / False Positive-Identification Rate FNIR false non-identification rate with FAP 10 almost double that of FAP 20 FAP 30 excels over all FAP levels FPIR not impacted by different FAP levels 28

29 The Size Compromise: NIST, 2-finger combinations The more fingers the better the matching performance Except for two thumbs, FAP 20/30 with two fingers better matching performance than FAP 10 with four fingers Two thumbs lowest performance across all FAP levels 29

30 NIST study results (4) Optimization strategy for given systems All test cases against (FAP10/20/30 and finger combinations) against all gallery configurations (flats, rolled, ten-prints) FAP 30 with two index fingers best combination FAP 10 with two index and two middle fingers as alternative Two thumbs lowest performance (all FAP levels) 30

31 The Size Compromise: 3 rd Party tests Capture dimensions vs. matching performance

32 The Size Compromise: NIST study conclusions The larger the capture size dimensions, the better the matching performance FAP 30 excels in matching performance over all 3 FAP levels For legacy FAP 10 systems: A combination of 2 index + 2 middle fingers can be an alternative to 2 FAP 30 index fingers. Ten flat fingers provide best matching performance compared to other flat only combinations Using only two fingers: Two index finger provides best and two thumbs provides lowest matching performance Attention: Sequence issues to be considered 32

33 In the End; Lessons learned: The Size Compromise: Conclusions PIV SAP 10 and SAP 20 = Made for verification, not Identification Better than nothing but not recommended for Mobile ID against AFIS. SAP 30 (PIV and Appendix F certified) = Minimum recommended level for sufficient Identification accuracy against an AFIS. 3 rd party tests show significant % of IDs missed using FAP 10 or FAP 20 (PIV) devices that would have been hits with FAP 30 devices. Scanner Size / weight / cost should be minimized, while avoiding to significantly compromise on matching accuracy (SAP level). Flash new! (of ): PSNI concluded initial trial of SAP 30 mobile ID devices in Belfast. One (1) single weekend transactions. 8 Hits. 8 arrested. 1 jailed. 1 st SAP 30 Mobile ID deployment in UK. Past = SAP

34 THANK YOU! QUESTIONS? Carl Gohringer, 34

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

Mobile Fingerprint Authentication Solution

Mobile Fingerprint Authentication Solution Mobile Fingerprint Authentication Solution 1 BioSign 2.0 I WHY BioSign 2.0? WORLD S FASTEST SPEED WORLD S MOST ACCURATE ALGORITHM ROBUST PERFORMANCE OVER TIME FLEXIBILITY IN DESIGN 50ms* authentication

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

World s Best Mobile Fingerprint Authentication Algorithm

World s Best Mobile Fingerprint Authentication Algorithm World s Best Mobile Fingerprint Authentication Algorithm Mobile Fingerprint Authentication Algorithm l 1 I WHY? I Performance The world s fastest, most accurate mobile fingerprint technology ever provides

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

6 facts about GenKey s ABIS

6 facts about GenKey s ABIS 6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every

More information

Role of Biometric Technology in Aadhaar Authentication

Role of Biometric Technology in Aadhaar Authentication UIDAI h Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 Role of Biometric Technology

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

SUPREMA LiveScan Solutions. June 2009

SUPREMA LiveScan Solutions. June 2009 SUPREMA LiveScan Solutions June 2009 Live Scan System Suprema Live-scanner Solution based on advanced optical technology and state-of-the-art software technology for fast capture and high quality is an

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Quantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management

Quantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management Quantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United

More information

Advances in Stand-off Biometrics

Advances in Stand-off Biometrics Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported

More information

Guidelines for Capturing Palmprints and Supplementals

Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals General Overview: The FBI will implement palmprint and supplemental print search capabilities

More information

Biometric Offender Movement

Biometric Offender Movement Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric

More information

Biometric Enrolment for the European Visa Informationsystem (VIS)

Biometric Enrolment for the European Visa Informationsystem (VIS) Biometric Enrolment for the European Visa Informationsystem (VIS) German Experiences 1 EU Visa Information System (VIS) Federal Foreign Office Visa Application EU VIS Border Police Border Control Territory

More information

COUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM

COUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM COUNTY OF LOS ANGELES REQUEST FOR INFORMATION RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM RFI NO. 414-SH COUNTY OF LOS ANGELES SHERIFF S DEPARTMENT Request for Information (RFI) Project No. 414-SH

More information

Aadhaar enabled Public Distribution System in Haryana

Aadhaar enabled Public Distribution System in Haryana DIRI Data Brief Aadhaar enabled Public Distribution System in Haryana Siddharth Sekhar Singh and Ashwini Chhatre January 2019 Key Facts Authentication failure rates in the State declined to.5% of all Active

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO 1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it

More information

Western Identification Network Service Strategy (January, 2008)

Western Identification Network Service Strategy (January, 2008) Western Identification Network Service Strategy (January, 2008) The purpose of this paper is to help members and other interested parties understand the unique nature of services provided by WIN that no

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

MORPHOSMART CBM SERIES

MORPHOSMART CBM SERIES MORPHOSMART CBM SERIES COMPACT BIOMETRIC MODULES FOR OEM INTEGRATION The best, most compact optical modules on the market Easy integration of biometric functions into multiple applications High quality

More information

Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson

Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR 7110 C. L. Wilson, M. D. Garris, & C. I. Watson MAY 2004 Matching Performance for the US-VISIT IDENT System Using Flat

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data INTERNATIONAL STANDARD ISO/IEC 19794-4 First edition 2005-06-01 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données

More information

REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS

REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS W H I T E PA P E R H a r d w a r e O b s o l e s c e n c e M a n a g e m e n t i n t h e B i o m e t r i c s I n d u s t r y REDUCING COSTS BY ENHANCING THE FLEXIBILITY OF BIOMETRIC SOLUTIONS Copyright

More information

NISTIR 7249 Two Finger Matching With Vendor SDK Matchers

NISTIR 7249 Two Finger Matching With Vendor SDK Matchers NISTIR 7249 Two Finger Matching With Vendor SDK Matchers C. Watson C. Wilson M. Indovina B. Cochran NISTIR 7249 Two Finger Matching With Vendor SDK Matchers C. Watson C. Wilson M. Indovina B. Cochran Image

More information

REAL-TIME IDENTIFICATION USING MOBILE HAND-HELD DEVICE : PROOF OF CONCEPT SYSTEM TEST REPORT

REAL-TIME IDENTIFICATION USING MOBILE HAND-HELD DEVICE : PROOF OF CONCEPT SYSTEM TEST REPORT REAL-TIME IDENTIFICATION USING MOBILE HAND-HELD DEVICE : PROOF OF CONCEPT SYSTEM TEST REPORT Prepared by: C/M Tien Vo Royal Canadian Mounted Police Scientific authority: Pierre Meunier DRDC Centre for

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data INTERNATIONAL STANDARD ISO/IEC 19794-4 Second edition 2011-12-15 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

NIST Tests Supporting Biometric Identification Applications

NIST Tests Supporting Biometric Identification Applications NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments: From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

Demographic Update through Update Client Lite (UCL)

Demographic Update through Update Client Lite (UCL) CSC e-governance Services India Limited, Ministry of Communications & Information Technology, Electronics Niketan, 3rd Floor, DeitY, 6 CGO Complex, Lodhi Road, New Delhi 110003 Phone : - 011-24301349 Operator

More information

2016 Global Identity Summit Pre-Conference Paper. Fingerprints

2016 Global Identity Summit Pre-Conference Paper. Fingerprints 2016 Global Identity Summit Pre-Conference Paper Fingerprints This is a community-developed document. Information and viewpoints provided within are not necessarily the opinions of the paper coordinators

More information

16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E

16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E www.supremainc.com 16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, 463-863, Korea T +82 31 783 4502 F +82 31 783 4503 E sales@supremainc.com 2014 Suprema, Inc. Suprema and identifying product names and

More information

Coesys Enrollment Solutions for Government Programs

Coesys Enrollment Solutions for Government Programs Coesys Enrollment Solutions for Government Programs Enrollment processes you can trust Enrollment is a first and critical step to ensure secure and reliable citizen registration before issuing trusted

More information

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI Aadhaar Scalability & Data Management Challenges Dr. Pramod K. Varma Chief Architect, UIDAI twitter.com/pramodkvarma pramodkvarma.com Understanding Aadhaar System 2 Establishing ID is a Challenge Issue

More information

Biometric Sample Quality Standards Importance, Status, and Direction

Biometric Sample Quality Standards Importance, Status, and Direction Biometric Sample Quality Standards Importance, Status, and Direction David Benini Aware, Inc. INCITS M1 Project Editor Biometric Sample Quality ISO/IEC SC 37 Project Editor Biometric Sample Quality Standard

More information

Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh

Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh DIRI Data Brief: 01 Aadhaar Authentication Failure in the Public Distribution System of Andhra Pradesh Siddharth Sekhar Singh and Ashwini Chhatre April 2018 Key Facts The average Aadhaar authentication

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification AAMVA UID9 Biometric Identification Report Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification Final Report Copyright 2003 International Biometric Group Version Description

More information

FRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC)

FRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC) FRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC) Version 1.1 Approved 1.1 Certification Department 24 th October 2018. PUBLIC Introduction This document covers the requirements for

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005 Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format Robert Yen DoD Biometrics Management Office October, 005 Agenda Biometric Standards ANSI INCITS Fingerprint Standards vs. SC 37

More information

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time

More information

mobichk powered by White Paper address 345 Plainfield Avenue, Suite 204 Edison, New Jersey, phone

mobichk powered by White Paper address 345 Plainfield Avenue, Suite 204 Edison, New Jersey, phone White Paper TM Mobile Biometric Capture, Look-up, and Identification, Mobizent's mobile identification integrated hardware and software solution provides public safety with a better way to conduct Personal

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately

More information

Lumidigm Frequently Asked Questions

Lumidigm Frequently Asked Questions Lumidigm Frequently Asked Questions PLT-02335, Rev. A.1 July 2015 Software Version 5.30 hidglobal.com Copyright 2014-2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. This document may not

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to

More information

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up

More information

PersonelID and PositiveID An Executive Summary

PersonelID and PositiveID An Executive Summary PersonelID and PositiveID An Executive Summary Homeland Security Are you who you say you are? 8010 Windwood Beach, Suite 200 Linden, MI 48451 888-248-3908 www.consultkinetic.com About Kinetic Group Designs

More information

Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints

Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Jianjiang Feng, Soweon Yoon, and Anil K. Jain Department of Computer Science and Engineering Michigan State University {jfeng,yoonsowo,jain}@cse.msu.edu

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

The National Biometrics Challenge 2011 Update

The National Biometrics Challenge 2011 Update The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema. S a Whe en identification matters s Leading Innovation in Biometrics & Security SUPREMA Biometric Solutions for Mobile Contact: C t t Sales@supremainc.com 2016 a Rightsreserved Reserved 2016 a Inc. Inc.

More information

NGI and Rap Back Focus Group Briefing

NGI and Rap Back Focus Group Briefing NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus

More information

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Toward a Manageable Criminal History System

Toward a Manageable Criminal History System BJS/SEARCH Web Seminar Toward a Manageable Criminal History System BJS/SEARCH, The National Consortium for Justice Information and Statistics 1 Sponsored by The Bureau of Justice Statistics (BJS), U.S.

More information

BIOFLEX. Applications

BIOFLEX. Applications HARDWARE BIOFLEX Bioflex is an essential tool for identity verification operations of a modern state. This identification device for persons is guarantor for population census, polling offices or police

More information

Face recognition algorithms: performance evaluation

Face recognition algorithms: performance evaluation Face recognition algorithms: performance evaluation Project Report Marco Del Coco - Pierluigi Carcagnì Institute of Applied Sciences and Intelligent systems c/o Dhitech scarl Campus Universitario via Monteroni

More information

FINGERPRINT BIOMETRICS

FINGERPRINT BIOMETRICS FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...

More information

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2 Review Article FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1.A.Imam 2 Address for Correspondence 1 Asst. Prof, ECE Deptt, Ajay Kumar Garg Engineering College, Ghaziabad 2 Asst. Prof,

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

Understanding Fingerprint Biometrics

Understanding Fingerprint Biometrics TECHNICAL SPECIFICATIONS Understanding Fingerprint Biometrics A brief look at fingerprints, how they are processed and how the accuracy of a biometric system is measured. ipulse Systems 7/1/2014 CONTENTS

More information

The European Union approach to Biometrics

The European Union approach to Biometrics The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1

More information

Registry of USG Recommended Biometric Standards

Registry of USG Recommended Biometric Standards Registry of USG Biometric Standards Version 1.0 DRAFT for Public Comment NSTC Subcommittee on Biometrics and Identity Management February 4,2008 1. Introduction This Registry of USG Biometric Standards

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

Biometric Specifications for Personal Identity Verification

Biometric Specifications for Personal Identity Verification NIST Special Publication 800-76-2 Biometric Specifications for Personal Identity Verification Patrick Grother Wayne Salamon Ramaswamy Chandramouli I N F O R M A T I O N S E C U R I T Y NIST Special Publication

More information

Bio-FactsFigures.docx Page 1

Bio-FactsFigures.docx Page 1 Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Match On Card MINEX 2

Match On Card MINEX 2 Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card

More information

Forensics: The Next Frontier for Biometrics. Anil K. Jain Michigan State University October 27, 2015

Forensics: The Next Frontier for Biometrics. Anil K. Jain Michigan State University  October 27, 2015 Forensics: The Next Frontier for Biometrics Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 27, 2015 Bertillon System (1882) Habitual Criminal Act (1869): Identify repeat offenders

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos

More information

Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions

Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions Zia Saquib Executive Director, C-DAC Mumbai & Elec. City saquib@cdac.in Santosh Kumar Soni Sr. Staff Scientist,

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

Base Access. Smart Identity Card Program. November 16, Jay Orgeron. BISA Program Manager

Base Access. Smart Identity Card Program. November 16, Jay Orgeron. BISA Program Manager Base Access Smart Identity Card Program November 16, 2010 Jay Orgeron BISA Program Manager 2004-2006 Mark pages according to the proprietary level of information as described in Company Procedure J103

More information

NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest

NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Palmprint Recognition using Novel Fusion Algorithm

Palmprint Recognition using Novel Fusion Algorithm Palmprint Recognition using Novel Fusion Algorithm Kannan Subramanian Dept. of MCA, Bharath University, Chennai-600073, India ABSTRACT: Palmprint is a promising biometric feature for use in access control

More information

Version 1.4. Cogent VDM and Device Guide

Version 1.4. Cogent VDM and Device Guide Version 1.4 Cogent VDM and Device Guide 2010 Cogent, Inc. All rights reserved. This document contains commercial information and trade secrets of Cogent, Inc. which are confidential and proprietary in

More information