Introduction to Bio-IDiom. NEC biometric authentication Bio-IDiom. April, 2018 Safer City Solutions Division Corporate Marketing Division NEC
|
|
- Nathaniel Gray
- 5 years ago
- Views:
Transcription
1 Introduction to Bio-IDiom NEC biometric authentication Bio-IDiom April, 2018 Safer City Solutions Division Corporate Marketing Division NEC
2
3 Progress of Digital Transformation Wave of rapidly progressing digitization Number of IoT devices 30.4 billion World population billion 3 NEC Corporation 2018
4 Changes through Digitization Immense improvement in productivity Emergence of unexpected competition Digital = Game changer 4 NEC Corporation 2018
5 Changes through Digitization NEC s Digital Transformation Empowering companies, industries, cities and people Enterprises Industries People Cities Adds new significance to people, things, and contexts Cyber world Real world Visualization Analysis Prescription 5 NEC Corporation 2018
6 Biometric authentication in our lives and society Trust and sharing without passing of physical keys. No passing Access to services without carrying IDs Use of services without waiting No carrying No waiting No forgetting Safe and secure credential that can never be forgotten Authenticated with biometric features as the key you naturally possess. Biometrics to become a common part of our daily lives. 6 NEC Corporation 2018
7 NEC s biometric authentication solutions NEC の生体認証 Iris Finger vein Fingerprint/ Palmprint Voice Ear acoustic 7 NEC Corporation 2018
8 NEC s biometric authentication solutions NEC s biometric authentication Bio-IDiom A safe digital environment for all people A world with risks Digital 8 NEC Corporation 2018
9 The Bio-IDiom Brand Story Instant authentication can generate trust bring the world closer together. Biometric authentication technologies use physical features of face, iris, ear, voice, palm, and finger to identify individuals. Possible applications range from security to services for governments, corporations and individuals. Ear acoustic Iris For over half a century NEC has engaged in the research and development of biometric authentication technologies. As the pioneer in the field, NEC strives to offer flexible and reliable biometric authentication to connect people and society globally for a safe and prosperous future. You are the key. Voice Finger vein Fingerprint Palmprint NEC s biometric authentication: Bio-IDiom 9 NEC Corporation 2018
10 Bio-IDiom Social Value Creation 10 NEC Corporation 2018
11 Biometric authentication for Social Value creation For the Safety, Security + Efficiency, Equality of society Public Safety Iris ID theft prevention Digital Government Education Fraud detection Smart Transportation Enterprise Fingerprint/ Palm print Finger vein Mega events Payments Voice Enhanced Citizen Service Entertainment Ear acoustic Safety Security + Efficiency Equality 11 NEC Corporation 2018
12 Global Deployment of NEC s Biometric Authentication Solutions Over 700 systems in over 70 countries globally Systems for Criminal Investigation, Immigration Control, National IDs, Entertainment, etc. 12 NEC Corporation 2018
13 South Wales Police, UK: Real-time face recognition Challenges Watchlist Detection Ensuring safety Ensuring and security in key locations with a high crowd level such as airports and stadiums Mega Events Solution Results Neo Watch real-time face recognition system Deployed during the week of the UEFA Champions League finals (June 2017), and contributed to the safe event management Matching of images captured from surveillance cameras mounted on police vehicles against a database of 50,000 face images of persons of interest, missing people etc. Real-time matching for fast and accurate identification of individuals. 170,000 spectators Database of 500,000 Actual arrests Real-time Watchlist detection for mega event security. NEC Press Release 13 NEC Corporation 2018
14 USA: LA County Sheriff s Department MBIS system Criminal Identification Challenges Solution Results Increase efficiency of criminal investigation. Multi-modal identification biometric solution Quick and efficient identity verification in the field and in prisons. Resolution of more cases. Matching of biometrics captured in crime scenes for suspect verification. Connect to federal and local law enforcement databases. (Including California DOJ and FBI) Uncovered 107 hits including 2 cold case homicides in the first 7 days. One of world s largest biometric criminal investigation service. Fingerprint 14 NEC Corporation 2018 NEC Press Release
15 Singapore: Safety and Security trial Watchlist Detection Urban Surveillance Challenges Solution Results Use of data analytics to meet safety and security needs. Neo face recognition, fingerprint recognition, video and acoustic analytics Testing of usability of biometrics, video and acoustic analysis technologies for safety and security in cities and critical infrastructures. Use of face and fingerprint recognition for enhanced security at entry points into Jurong Island. Monitoring for suspicious opening of doors/ windows of busses entering the area. Early detection of suspicious individuals and behaviors using data input from multiple sensors such as surveillance cameras, microphones etc. Safety and security of the country through inter-agency collaboration. Fingerprint NEC Press Release 15 NEC Corporation 2018
16 USA: CBP US Exit Control face recognition Immigration Control Challenges Solution Results Reduce processing time, enhance customer service and safety of airport operations. Walkthrough face recognition system Neo Express Enhanced security for exit control using face recognition. Enable frictionless exit process. Exit control trial in several US airports including Dulles International Airport. Checking ageist passport DB (US citizens) and entry data (visitors) to confirm the identities of those leaving the country. Enhance security and enable detection of illegal overstays of foreign visitors. Frictionless exit control system using face recognition. 16 NEC Corporation 2018 NEC press release
17 South Wales Police, UK: Real-time face recognition Challenges Watchlist Detection Ensuring safety Ensuring and security in key locations with a high crowd level such as airports and stadiums Mega Events Solution Results Neo Watch real-time face recognition system Deployed during the week of the UEFA Champions League finals (June 2017), and contributed to the safe event management Matching of images captured from surveillance cameras mounted on police vehicles against a database of 50,000 face images of persons of interest, missing people etc. Real-time matching for fast and accurate identification of individuals. 170,000 spectators Database of 500,000 Actual arrests Real-time Watchlist detection for mega event security. NEC Press Release 17 NEC Corporation 2018
18 JFK International Airport, USA: Entry Control system Challenges Immigration Control Reduce processing time, enhance customer service and safety of airport operations. Solution Results Neo face recognition engine. Enhanced security with face recognition at Automated Passport Control kiosks at JFK International Airport in New York. Matching of face data in the e-passport against the photo of the passenger captured at the kiosk, to ensure the legitimate owner of the passport is entering the country. System delivered by Unisys and in operation since January Faster and securer immigration control with face recognition. 18 NEC Corporation 2018 NEC press release
19 Brazil: recognition for 14 international airports Enhanced Citizen Services Challenges Increase efficiently and rigor of customs control at airports. Solution Results Neo Watch real-time face recognition system Detection of pre-registered individuals who have been registered for suspicious activities. Used to enhance efficiency and effectiveness of customs operations in 14 international airports in Brazil. Screening of passengers as they walk past the customs control area based on a database of pre-registered suspects. Preventing illegal activities at airport customs control. 19 NEC Corporation 2018 NEC press release
20 India: Aadhaar (Unique Identification numbers) Program ID theft prevention Enhanced Citizen Services Challenges Equal services for its 1.2 billion citizens. Solution Results Multi-modal biometric authentication system. Accurate citizen data registered with the government. Equal and efficient social services for citizens. Multi-modal system combining face, fingerprint and iris recognition to identify individuals. Prevent duplicate registrations and ensure all citizens have equal access to services such as food supply, employment and tax payment. Social services for 1.2 billion with multi-modal biometrics. Fingerprint Iris 20 NEC Corporation 2018
21 Japan: Identity verification for My Number Card ID theft prevention Challenges Solution Results Preventing identity fraud at My Number Card issuance. ID verification using face recognition at the issuance counters in local government facilities nationwide (1,743 organizations). Source: The Mainichi, Jan 8, 2016 Tagging of face data to the registered individual at issuance to enable the use of My Number Cards as a method of authentication in various use cases. recognition is used to verify identity of citizens at My Number Card issuance in the local government facilities nationwide. In operation since January 2016 with the introduction of My Number Card system in Japan. Fist in Japan! recognition for all local governments. 21 NEC Corporation 2018 Local governments nationwide NEC Technical Journal Prevent ID fraud at card issuance Matching of face data against the registered image. Match data in the My Number Card database マイナンバーカード交付受付 Person at the office for issuance
22 Japan: Local government offices Enhanced Citizen Services Challenges Solution Results Efficient security measure for local governments. ID verification solution with finger hybrid recognition, and face recognition. Enhanced operations and efficiency for better citizen services. Instant and accurate authentication with the simple scanning of finger, or face by sitting in front of the PC. Simpler and more convenient than using an IC card Improves the efficiency of the increasingly complex card issuing/management operation and reduces the risks of cards getting lost. More projects with the start of My Number Card operations. Fingerprint 22 NEC Corporation 2018
23 Japan: Concert Ticket Holder Identity Verification Identity theft prevention Mega Event Challenges Solution Results Risk of entry with resold tickets using borrowed or fake IDs. Neo face recognition engine for identity verification. Supports events of every size or scale. Reduces burden on audience by eliminating the need to bring photo IDs to the venue. Matching of faces captured using tablets at admission with the preregistered face images of the ticket holders. Supports events of any size and scale, including those with tens and thousands of audience through fan clubs. Reduces admission time by up to 30% compared to visual inspection by concert staff, enabling smooth entry for the audience. Ticket resell prevention and smooth admission! 23 NEC Corporation 2018 NEC Online TV:
24 Japan: Universal Studio Japan Admission Enhanced Citizen Services Challenges Printing annual passes with facial photos, and visual inspection by staff. Solution Neo face recognition engine Results Smooth admission and a VIP like experience for visitors. recognition deployed at special gates for annual pass holders ensures smooth entry into the park and gives visitors that VIP feeling. Visitors swipe their annual pass over the reader, face the monitor, and wait one second for the system to recognize their face. Significantly reduces the time needed to issue the passes. Prevents the use of passes by persons other than the registered pass holder. VIP-like entry in to the park with face recognition! NEC OnlineTV: 24 NEC Corporation 2018
25 Taiwan: Taipei Summer Universiade access control Identity theft prevention Mega Event Challenges Enhancing venue security with access control for staff members. Solution Results Neo face recognition engine Secure and smooth personal authentication at entrance. Contribute to the safe and secure event operation. recognition based access control in the main operation centre in Taipei Arena. Used for the access control for the 750 staff members entering the venue daily. Enable walkthrough recognition without having to stop to be authenticated. Smooth and secure venue access with face recognition. 25 NEC Corporation 2018 NEC press release
26 India: Lemon Tree Hotels Watchlist Detection Enhanced Citizen Services Challenges Solution Results Detecting persons of interest who could be a threat to the hotel. Neo Watch real time face recognition system. Adopted as a new security standard in the hospitability field in India. Deployed at Delhi Aerocity Hotel of Lemon Tree Hotels, a major hotel chain in India. Real time matching of faces as people enter the hotel, against a database of potential threats provided by local authorities. System also has the ability to detect VIP customers for enhanced customer service. recognition to ensure safe and pleasant experience. 26 NEC Corporation 2018 NEC press release htttp://jpn.nec.com/press/201411/ _02.html
27 Singapore: OCBC Bank VIP recognition Enhanced Citizen Services Challenges Solution Results Enhanced service for VIP customers. Neo face recognition engine Identify Premier Banking members with their faces and enhance services for VIPs. Trial in Holland Village Branch. Real-time identification of VIPs as they enter the lounge. Customized service (preference of drinks, magazines) based on VIP data. Input of purpose of visit and feedback for future services. First bank in Singapore to use face recognition. Elevate customer experience using face recognition. 27 NEC Corporation 2018 NEC press release
28 Japan: Walk-through Entry (NEC in-house trial) Challenges Prevention of identity theft Employees need to stop at security gates for ID card authentication. Unable to prevent entry using someone else s employee card. Solution Results Neo Access Control for entry/ exit management. Efficient operation at the entrance with walk-through authentication. Matching of photos of employees captured at the gate against the database of preregistered employee face data. No need to stop in front of the camera. Trial with about 1,000 employees at the NEC Headquarter building in Tokyo. To improve practical technical performance and accumulate know-how for capturing good quality images for accurate identification of individuals. 28 NEC Corporation 2018 recognition for walk-through entry!
29 Japan: Payment Service (NEC in-house trial) Prevention of identity theft Challenges Solution Results Payments at the cashier takes too long. Fraud using stolen ID cards. Neo face recognition engine Payments via face recognition helps to improve business efficiency and ensures verification of the person s identity. Verifies identity by comparing faces captured at the POS terminal against the preregistered face images of employees. Feasibility of face recognition for cashless/ cardless payment was verified through the trail at shops in the NEC Headquarter building with 500 employees. To improve practical technical performance and accumulate operation know-how of recognition performance and operation load under various conditions in shops. Making cashless and cardless payments possible 29 NEC Corporation 2018 NEC press release
30 Bio-IDiom Biometric Authentication Technology 30 NEC Corporation 2018
31 Different biometric authentication technologies Characteristics of different biometric authentication Fingerprint recognition offers great convenience with high accuracy and ease of use. recognition is highly convenient in that it does not require any special actions Walk-through entry/ exit while holding your luggage, etc. High DNA Iris Vein Finger print Accuracy Palm print Otoacoustic Low Low 31 NEC Corporation 2018 Hand writing Voice NEC s key technology Convenience High *Source: Addition to Biometrics Market White Paper 2007 version Yano Research Institute, Ltd.
32 History of NEC s Biometric Authentication technology A pioneer with over 40 years of experience in R&D 2008: Developed finger hybrid recognition technology : Ranked No.1 in US Government benchmark testing Late 1990 s: Global deployment Early 1990 s: Criminal AFIS for states across US 1984: San Francisco Police Department 1982: Metropolitan Police Department (Japan) 2010 Multi-modal authentication Combination of various biometrics such as fingerprint, face, and iris. 2017: Ranked No.1 for the 4 th consecutive time in US Government benchmark testing 2009, 2010, and 2013: Ranked No.1 in US Government benchmark testing 2003 Global deployment 1999 Commercialization of face recognition 1996 Started 3D face recognition R&D Fingerprint 1971: Started research for fingerprint recognition 32 NEC Corporation : Started research for face recognition Wider range of application in our daily lives through enhancement of technology and combination of different modalities.
33 World-class Technology: US NIST* Benchmark Testing NIST:National Institute of Standards and Technology FpVTE2003 FpVTE2012 Slap Fingerprint Segmentation Evaluation 2004 MINEX2016 Fingerprint recognition Evaluation of Latent Fingerprint Technologies 2007(ELFT2007) NIST Proprietary Fingerprint Template Testing (PFT2009 PFTⅡ 2013) MBE recognition Multiple Biometric Grand Challenge 2009(MBGC2009) Multiple Biometrics Evaluation 2010(MBE2010) Vendor Test 2013(FRVT 2013) In Video Evaluation (FIVE) *Voice recognition technology was also ranked No1. *Iris recognition benchmark testing currently in progress. 33 NEC Corporation 2018
34 Detection of faces from images/ videos and analyzing features to identify individuals detection: Detect faces from images Matching: Verify if it is the same person Robustness against varying conditions Angle Infrared camera images DETECT Verify features MATCH s are recognized through 2 processes, face detection and face matching Detecting faces. (number of faces, position, size, face features, etc.) Matching faces to identify who it is. (Verifying face features, searching for matches in the database, showing results based on matching scores, etc.) Achieves high accuracy with robustness against varying environment and conditions. 34 NEC Corporation 2018 Lighting Expression Aging
35 Iris Matching of the iris features, muscle pattern around the pupil, to identify individuals. Iris Pupil Retina Extremely high accuracy and speed of recognition Contact-less, hands-free recognition in the same way as face recognition. Biometrics information is not left on the capturing device. Uses near infrared lighting (LED) and a camera, enabling use in dark locations. 35 NEC Corporation 2018
36 Fingerprint/palmprint recognition Analyzing fingerprint/ palmprint features extracted from finger/ palm for recognition. With its permanence and uniqueness, fingerprint and palmprint is used for applications with rigid recognition such as criminal investigation and National ID systems in Public Safety market worldwide. Original image Print images of individuals are irreversible [Protection of privacy] NEC s unique high-speed and highly accurate recognition technology. Abundant track record of installations around the world. Based on international standard for fingerprint/palm print, and minutia data formats and the data is compatible with other systems. 36 NEC Corporation 2018 Digitized data Original image is discarded after digitization Minutiae and related method Relation network Only the digitalized data is stored Registered data
37 Finger vein recognition For Japan domestic market only Detection finger vein patterns of the finger to identify individuals. Hybrid fingerprint recognition solution Combination of fingerprint and finger vein makes it difficult to forge or steal. It is used widely for access to PCs in governments and enterprises. Capable of reading fingerprint and finger vein information simultaneously by simply placing a finger over the reader. World s first finger hybrid identification technology for secure user authentication. High-speed and highly accurate recognition technology. Difficult to forge as it uses vein patterns inside a finger. Contactless capture of fingerprint and finger vein data, for hygienic benefits and protection of privacy (no data is left on the device surface). 37 NEC Corporation 2018
38 Voice recognition Picks up voice through a microphone and identify individuals by analyzing features. Voice database Verify A B C E D F G Recommended data size: seconds/person H Voice data of 10 seconds or more is recommended. Contact-less, hands-free recognition. Identifies an individual remotely through a telephone, etc. Not depend on the language spoken. No need for special devices (standard microphone on smart phone and tablet). 38 NEC Corporation 2018
39 Ear acoustic recognition using the shape of the ear cavity that are unique to each individual. Transmitted signal Analyzing the sound reflection patterns Hearable device A B Received Signal Identification using unique patterns C Peak of 5-8 khz (Supports distance of 2-3 cm to the ear drum) High-speed and highly accurate recognition technology. Contact-less, hands-free recognition. Applicable for locations where users wear masks or gloves, such as in hospitals. Highly secure method of authentication. High affinity for real life application, without the need to look at any screens, etc. 39 NEC Corporation 2018
40 Multi-modal authentication Multi-modal authentication by combining different biometric recognition modalities. Ear acoustic Iris Authentication by combining multiple modals Bio-IDiom User friendly + High accuracy/ security Voice Fingerprint/palm print Finger vein 40 NEC Corporation 2018
41
Combating Accuracy Issues in Biometric Solutions
NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018 Biometric Authentication
More informationIntroduction to NEC s Public Safety Solutions
Introduction to NEC s Public Safety Solutions Takehiko Akiyama Manager, Transportation & City Infrastructure Div. NEC Corporation February 20 th 2018 Today s Agenda Introduction Law Enforcement Civil
More informationNeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest
NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most
More informationTHE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE
THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationUltraMatch. Standalone Iris Recognition System
UltraMatch Standalone Iris Recognition System Smart LED Utilizes the most accurate biometric recognition technology Color LED shows the proper verification distance Mobile management enabled by wireless
More informationNIST Tests Supporting Biometric Identification Applications
NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National
More informationCreating Innovation through the Digitalization of Ekimachi Spaces
FEATURED ARTICLES Social Innovation through Global Customer Co-creation Creating Innovation through the Digitalization of Ekimachi Spaces The collaborative creation of services in urban fields such as
More informationIntroduction of Toshiba Face Recognition Software Toshiba Corporation 1
Introduction of Toshiba Face Recognition Software 2016 Toshiba Corporation 1 Why choose Toshiba s FRS? * Performance ** - NIST-Proven World Top Class Accuracy & Speed - 150 patents Experience - Over 1000
More informationA quick guide to iris recognition. Click on blue squares to navigate
Click on blue squares to navigate Safe Accurate Fast Stable Scalable Reliable Non-invasive Personal identification... is key Identity authentication... is key Identity authentication... you are the key
More informationBiometric Technology
Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationPALM VEIN TECHNOLOGY
Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)
More informationNeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe
NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationGaining Business Value from IoT
Gaining Business Value from IoT Digital Aviation Conference 2018 Thomas Bengs GM, Head of Biometrics EMEIA Enterprise Cybersecurity EMEIA Human Centric Innovation Co-creation for Success 0 2018 FUJITSU
More informationDatasheet Fujitsu PalmSecure Contactless Biometrics Authentication
Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Award-winning Contactless Authentication Technology Verifies An Individual s Identity by Recognizing Palm Vein Patterns enabling dynamic
More informationThe face recognition company
The face recognition company 2 Cognitec develops market-leading face recognition technologies and applications for enterprise and government customers around the world. Cognitec develops a face recognition
More informationNASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen
NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce
More informationOptimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology
Mobility Services for Better Urban Travel Experiences Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology The high level of progress in urban planning is being accompanied
More informationFujitsu World Tour 2016
Fujitsu World Tour 2016 Human Centric Innovation in Action Utrecht 13 June 2016 0 Copyright 2016 FUJITSU Mobilizing the Enterprise One size does not fit all powered by 1 Copyright 2016 FUJITSU Speaker
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationThe face recognition company
The face recognition company 2 Leading the Industry 3 Cognitec develops market-leading face recognition technologies and applications for enterprise and government customers around the world. Cognitec
More informationIdentification or Verification? Advanced Identification Technology
Identification or Verification? Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining
More informationHuman Identification Using Biometry
Human Identification Using Biometry by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional. Fundamentals of Biometrics Biometry Definition Generic therm that describes
More informationNEC Australia Overview. au.nec.com
NEC Australia Overview au.nec.com 2 NEC Australia Overview NEC expertise and technology create a smarter future through innovative, effective ICT-enabled solutions for enterprises, businesses and government
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationExtremely-Large-Scale Biometric Authentication System - Its Practical Implementation
Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to
More informationBiometric Entry-Exit. July 11, 2017
Biometric Entry-Exit July 11, 2017 CBP Assumes Biometric Exit Mission in 2013 1996 Congress passed legislation mandating the creation of a biographic entry and exit system 2001 Post 9/11 Congress passed
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationSECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY
SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,
More informationHassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R
Hassle-free banking in the DIGITAL AGE through NEXT-GEN Technologies W H I T E PA P E R Experience smooth transactions with the new generation of banking and payments using facial recognition. Financial
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationOverview of PBI-blockchain cooperation technology
FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview
More informationSurvey Guide: Businesses Should Begin Preparing for the Death of the Password
Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their
More informationAdvances in Stand-off Biometrics
Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported
More informationSolution. Imagine... a New World of Authentication.
A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure
More informationSeoul e-government Policies & Strategies. Information System Planning Bureau
Seoul e-government Policies & Strategies Information System Planning Bureau > About Seoul No.6 Ranked 6th in Urban Competitiveness Worldwide ( 15) 90% More than 90% of Seoul citizens are Smart Phone Users
More informationSocial Value Creation via IoT
Social Value Creation via IoT Smart City, Enterprise and Service Solutions Kurt Jacobs kurt.jacobs@necect.com NEC Enterprise Communication Technologies 3 June 2016 The Earth in 2050 (Source:OECD, FAO,
More information6 facts about GenKey s ABIS
6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every
More informationThe Role of Biometric Networks in Recognition of Person
Communications 2015; 3(5): 81-85 Published online August 10, 2015 (http://www.sciencepublishinggroup.com/j/com) doi: 10.11648/j.com.20150305.11 ISSN: 2328-5966 (Print); ISSN: 2328-5923 (Online) The Role
More informationTHE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors
THE BEST OF BOTH WORLDS Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security By Mahdi Mekic, NXP Semiconductors A new generation of contactless smartcards, built to support
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationHID goid Mobile ID Solution
HID goid Mobile ID Solution Citizen ID Solutions Introducing HID goid for Citizen IDs on Smartphones HID goid platform for mobile IDs delivers the secure infrastructure to allow citizen ID s to be safely
More informationMobile: Purely a Powerful Platform; Or Panacea?
EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA
More informationIdentity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp.
Identity and Access Management Michael Sheketoff Senior Solutions Architect, Unisys Corp. Agenda Unisys Step Zero Identification and Credentialing Who are you giving that badge to? Access Control logical
More informationProtecting your Privacy Winchester Cathedral Privacy Notice
Protecting your Privacy Cathedral Privacy Notice Introduction Cathedral is committed to protecting the privacy of any personal information it may hold regarding individuals. This Privacy Note explains
More informationA Planet of Smarter Cities: Security and critical infrastructures impact
A Planet of Smarter Cities: Security and critical infrastructures impact Alberto Barrientos Director of Public Sector IBM Smarter Cities Alberto.barrientos@es.ibm.com Urban population growth expected to
More informationThe European Union approach to Biometrics
The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1
More informationThe ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered
The Identity as a Service Suite (IDaaSS) Solutions GUIDE Identity Credentials great looking secure ID credentials delivered www.idconcierge.com.au www.nxient.com nxient s Identity as a Service Suite (IDaaSS)
More informationFace recognition for enhanced security.
Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology
More informationEnabling Compliance for Physical and Cyber Security in Mobile Devices
Enabling Compliance for Physical and Cyber Security in Mobile Devices Brandon Arcement & Chip Epps HID Global Sept 12, 2016 1630-1730 ET Agenda Smart Devices vs. Traditional Cards Mobility Infrastructure
More informationInternet of Things Towards a more collaborative model
i Internet of Things Towards a more collaborative model Brahim GHRIBI Head of Government Relations MEA NOKIA 1 Nokia 2017 Past has been about connecting people, the future is about connecting things Improving
More informationBiometric Use Case Models for Personal Identity Verification
Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationINTUS 1600PS Palm Vein Authentication
INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional
More informationBiometric Offender Movement
Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric
More informationCitizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development
Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software
More informationUNCLASSIFIED / FOUO UNCLASSIFIED / FOUO
1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationA Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.
A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING www.consultmipl.com MIPL is a security consulting company from India, offering sustainable designs and solutions for security management.
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationCyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities
SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+
More informationYour single source for a safe, secure, and sustainable airport
Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More informationGeo-spatial technology enables & enhances the objectives of Safe City - Smart City
Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Presented By: Mr. Shishir Verma Vice President MapmyIndia (CE Info Systems Pvt. Ltd.) About Us Making Our World Better
More informationSecuring Americans Identities: The Future of the Social Security Number
Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James
More informationExperian Fraud Prevention Solutions
Experian Fraud Prevention Solutions FMVÖ Business Breakfast Cyber Crime prevention for the financial services industry 1 Experian Internal use only Introducing Experian 2 Experian Identity Theft is a Global
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationSTADIUM VIDEO SURVEILLANCE. with Logipix System. 1
STADIUM VIDEO SURVEILLANCE with Logipix System www.logipix.com 1 Main benefits 1. Stitched panoramic images up to 240 MP resolution cover the entire seating bowl 2. Recognizable faces at every seat in
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationChallenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation
Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationThe Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services
The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO
More informationHow. Biometrics. Expand the Reach of Mobile Banking ENTER
How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More information2018 FIFA World Cup Russia integrates safety, security and service
2018 FIFA World Cup Russia integrates safety, security and service Published on 18 Jun 2018 The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans
More informationTHE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS
THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS Crossmatch s Michel Nerrant on Improving Security Without Adding Friction Michel Nerrant Nerrant is responsible for business
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationSmart Mobile Identity. Revolutionizing biometric identity verification
Smart Mobile Identity Revolutionizing biometric identity verification Introduction Mobile devices are poised to transform the biometric industry and greatly broaden the use of biometrics for identity verification.
More informationFBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationDefence, Safety and Security
Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts
More informationSECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability
SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security
More informationUNCLASSIFIED//FOR OFFICIAL USE ONLY. Prepare + Prevent + Respond + Recover + Mitigate START WITH PREVENTION
Current Partners UNCLASSIFIED//FOR OFFICIAL USE ONLY LA-SAFE Threat Groups Sectors Domestic Terrorism International Terrorism Gangs/Narcotics Violent/High Profile CI/KR Critical Infrastructure and Key
More informationHID goid Mobile ID Solution
HID goid Mobile ID Solution Government ID Solutions It s Time for Mobile IDs HID Global is poised to lead this shift, providing the secure ecosystem needed to facilitate the provision of citizen IDs to
More informationUsing Biometric Authentication to Elevate Enterprise Security
Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of
More informationSOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES
SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES PAGE 1 INTRODUCTION In 1950, the fishing village of Shenzhen in south-east China had 3,148 inhabitants. By 2025 it is predicted that
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationIS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
More informationRecommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division
Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately
More informationSECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability
SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security
More informationEMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS
Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More information