Introduction to Bio-IDiom. NEC biometric authentication Bio-IDiom. April, 2018 Safer City Solutions Division Corporate Marketing Division NEC

Size: px
Start display at page:

Download "Introduction to Bio-IDiom. NEC biometric authentication Bio-IDiom. April, 2018 Safer City Solutions Division Corporate Marketing Division NEC"

Transcription

1 Introduction to Bio-IDiom NEC biometric authentication Bio-IDiom April, 2018 Safer City Solutions Division Corporate Marketing Division NEC

2

3 Progress of Digital Transformation Wave of rapidly progressing digitization Number of IoT devices 30.4 billion World population billion 3 NEC Corporation 2018

4 Changes through Digitization Immense improvement in productivity Emergence of unexpected competition Digital = Game changer 4 NEC Corporation 2018

5 Changes through Digitization NEC s Digital Transformation Empowering companies, industries, cities and people Enterprises Industries People Cities Adds new significance to people, things, and contexts Cyber world Real world Visualization Analysis Prescription 5 NEC Corporation 2018

6 Biometric authentication in our lives and society Trust and sharing without passing of physical keys. No passing Access to services without carrying IDs Use of services without waiting No carrying No waiting No forgetting Safe and secure credential that can never be forgotten Authenticated with biometric features as the key you naturally possess. Biometrics to become a common part of our daily lives. 6 NEC Corporation 2018

7 NEC s biometric authentication solutions NEC の生体認証 Iris Finger vein Fingerprint/ Palmprint Voice Ear acoustic 7 NEC Corporation 2018

8 NEC s biometric authentication solutions NEC s biometric authentication Bio-IDiom A safe digital environment for all people A world with risks Digital 8 NEC Corporation 2018

9 The Bio-IDiom Brand Story Instant authentication can generate trust bring the world closer together. Biometric authentication technologies use physical features of face, iris, ear, voice, palm, and finger to identify individuals. Possible applications range from security to services for governments, corporations and individuals. Ear acoustic Iris For over half a century NEC has engaged in the research and development of biometric authentication technologies. As the pioneer in the field, NEC strives to offer flexible and reliable biometric authentication to connect people and society globally for a safe and prosperous future. You are the key. Voice Finger vein Fingerprint Palmprint NEC s biometric authentication: Bio-IDiom 9 NEC Corporation 2018

10 Bio-IDiom Social Value Creation 10 NEC Corporation 2018

11 Biometric authentication for Social Value creation For the Safety, Security + Efficiency, Equality of society Public Safety Iris ID theft prevention Digital Government Education Fraud detection Smart Transportation Enterprise Fingerprint/ Palm print Finger vein Mega events Payments Voice Enhanced Citizen Service Entertainment Ear acoustic Safety Security + Efficiency Equality 11 NEC Corporation 2018

12 Global Deployment of NEC s Biometric Authentication Solutions Over 700 systems in over 70 countries globally Systems for Criminal Investigation, Immigration Control, National IDs, Entertainment, etc. 12 NEC Corporation 2018

13 South Wales Police, UK: Real-time face recognition Challenges Watchlist Detection Ensuring safety Ensuring and security in key locations with a high crowd level such as airports and stadiums Mega Events Solution Results Neo Watch real-time face recognition system Deployed during the week of the UEFA Champions League finals (June 2017), and contributed to the safe event management Matching of images captured from surveillance cameras mounted on police vehicles against a database of 50,000 face images of persons of interest, missing people etc. Real-time matching for fast and accurate identification of individuals. 170,000 spectators Database of 500,000 Actual arrests Real-time Watchlist detection for mega event security. NEC Press Release 13 NEC Corporation 2018

14 USA: LA County Sheriff s Department MBIS system Criminal Identification Challenges Solution Results Increase efficiency of criminal investigation. Multi-modal identification biometric solution Quick and efficient identity verification in the field and in prisons. Resolution of more cases. Matching of biometrics captured in crime scenes for suspect verification. Connect to federal and local law enforcement databases. (Including California DOJ and FBI) Uncovered 107 hits including 2 cold case homicides in the first 7 days. One of world s largest biometric criminal investigation service. Fingerprint 14 NEC Corporation 2018 NEC Press Release

15 Singapore: Safety and Security trial Watchlist Detection Urban Surveillance Challenges Solution Results Use of data analytics to meet safety and security needs. Neo face recognition, fingerprint recognition, video and acoustic analytics Testing of usability of biometrics, video and acoustic analysis technologies for safety and security in cities and critical infrastructures. Use of face and fingerprint recognition for enhanced security at entry points into Jurong Island. Monitoring for suspicious opening of doors/ windows of busses entering the area. Early detection of suspicious individuals and behaviors using data input from multiple sensors such as surveillance cameras, microphones etc. Safety and security of the country through inter-agency collaboration. Fingerprint NEC Press Release 15 NEC Corporation 2018

16 USA: CBP US Exit Control face recognition Immigration Control Challenges Solution Results Reduce processing time, enhance customer service and safety of airport operations. Walkthrough face recognition system Neo Express Enhanced security for exit control using face recognition. Enable frictionless exit process. Exit control trial in several US airports including Dulles International Airport. Checking ageist passport DB (US citizens) and entry data (visitors) to confirm the identities of those leaving the country. Enhance security and enable detection of illegal overstays of foreign visitors. Frictionless exit control system using face recognition. 16 NEC Corporation 2018 NEC press release

17 South Wales Police, UK: Real-time face recognition Challenges Watchlist Detection Ensuring safety Ensuring and security in key locations with a high crowd level such as airports and stadiums Mega Events Solution Results Neo Watch real-time face recognition system Deployed during the week of the UEFA Champions League finals (June 2017), and contributed to the safe event management Matching of images captured from surveillance cameras mounted on police vehicles against a database of 50,000 face images of persons of interest, missing people etc. Real-time matching for fast and accurate identification of individuals. 170,000 spectators Database of 500,000 Actual arrests Real-time Watchlist detection for mega event security. NEC Press Release 17 NEC Corporation 2018

18 JFK International Airport, USA: Entry Control system Challenges Immigration Control Reduce processing time, enhance customer service and safety of airport operations. Solution Results Neo face recognition engine. Enhanced security with face recognition at Automated Passport Control kiosks at JFK International Airport in New York. Matching of face data in the e-passport against the photo of the passenger captured at the kiosk, to ensure the legitimate owner of the passport is entering the country. System delivered by Unisys and in operation since January Faster and securer immigration control with face recognition. 18 NEC Corporation 2018 NEC press release

19 Brazil: recognition for 14 international airports Enhanced Citizen Services Challenges Increase efficiently and rigor of customs control at airports. Solution Results Neo Watch real-time face recognition system Detection of pre-registered individuals who have been registered for suspicious activities. Used to enhance efficiency and effectiveness of customs operations in 14 international airports in Brazil. Screening of passengers as they walk past the customs control area based on a database of pre-registered suspects. Preventing illegal activities at airport customs control. 19 NEC Corporation 2018 NEC press release

20 India: Aadhaar (Unique Identification numbers) Program ID theft prevention Enhanced Citizen Services Challenges Equal services for its 1.2 billion citizens. Solution Results Multi-modal biometric authentication system. Accurate citizen data registered with the government. Equal and efficient social services for citizens. Multi-modal system combining face, fingerprint and iris recognition to identify individuals. Prevent duplicate registrations and ensure all citizens have equal access to services such as food supply, employment and tax payment. Social services for 1.2 billion with multi-modal biometrics. Fingerprint Iris 20 NEC Corporation 2018

21 Japan: Identity verification for My Number Card ID theft prevention Challenges Solution Results Preventing identity fraud at My Number Card issuance. ID verification using face recognition at the issuance counters in local government facilities nationwide (1,743 organizations). Source: The Mainichi, Jan 8, 2016 Tagging of face data to the registered individual at issuance to enable the use of My Number Cards as a method of authentication in various use cases. recognition is used to verify identity of citizens at My Number Card issuance in the local government facilities nationwide. In operation since January 2016 with the introduction of My Number Card system in Japan. Fist in Japan! recognition for all local governments. 21 NEC Corporation 2018 Local governments nationwide NEC Technical Journal Prevent ID fraud at card issuance Matching of face data against the registered image. Match data in the My Number Card database マイナンバーカード交付受付 Person at the office for issuance

22 Japan: Local government offices Enhanced Citizen Services Challenges Solution Results Efficient security measure for local governments. ID verification solution with finger hybrid recognition, and face recognition. Enhanced operations and efficiency for better citizen services. Instant and accurate authentication with the simple scanning of finger, or face by sitting in front of the PC. Simpler and more convenient than using an IC card Improves the efficiency of the increasingly complex card issuing/management operation and reduces the risks of cards getting lost. More projects with the start of My Number Card operations. Fingerprint 22 NEC Corporation 2018

23 Japan: Concert Ticket Holder Identity Verification Identity theft prevention Mega Event Challenges Solution Results Risk of entry with resold tickets using borrowed or fake IDs. Neo face recognition engine for identity verification. Supports events of every size or scale. Reduces burden on audience by eliminating the need to bring photo IDs to the venue. Matching of faces captured using tablets at admission with the preregistered face images of the ticket holders. Supports events of any size and scale, including those with tens and thousands of audience through fan clubs. Reduces admission time by up to 30% compared to visual inspection by concert staff, enabling smooth entry for the audience. Ticket resell prevention and smooth admission! 23 NEC Corporation 2018 NEC Online TV:

24 Japan: Universal Studio Japan Admission Enhanced Citizen Services Challenges Printing annual passes with facial photos, and visual inspection by staff. Solution Neo face recognition engine Results Smooth admission and a VIP like experience for visitors. recognition deployed at special gates for annual pass holders ensures smooth entry into the park and gives visitors that VIP feeling. Visitors swipe their annual pass over the reader, face the monitor, and wait one second for the system to recognize their face. Significantly reduces the time needed to issue the passes. Prevents the use of passes by persons other than the registered pass holder. VIP-like entry in to the park with face recognition! NEC OnlineTV: 24 NEC Corporation 2018

25 Taiwan: Taipei Summer Universiade access control Identity theft prevention Mega Event Challenges Enhancing venue security with access control for staff members. Solution Results Neo face recognition engine Secure and smooth personal authentication at entrance. Contribute to the safe and secure event operation. recognition based access control in the main operation centre in Taipei Arena. Used for the access control for the 750 staff members entering the venue daily. Enable walkthrough recognition without having to stop to be authenticated. Smooth and secure venue access with face recognition. 25 NEC Corporation 2018 NEC press release

26 India: Lemon Tree Hotels Watchlist Detection Enhanced Citizen Services Challenges Solution Results Detecting persons of interest who could be a threat to the hotel. Neo Watch real time face recognition system. Adopted as a new security standard in the hospitability field in India. Deployed at Delhi Aerocity Hotel of Lemon Tree Hotels, a major hotel chain in India. Real time matching of faces as people enter the hotel, against a database of potential threats provided by local authorities. System also has the ability to detect VIP customers for enhanced customer service. recognition to ensure safe and pleasant experience. 26 NEC Corporation 2018 NEC press release htttp://jpn.nec.com/press/201411/ _02.html

27 Singapore: OCBC Bank VIP recognition Enhanced Citizen Services Challenges Solution Results Enhanced service for VIP customers. Neo face recognition engine Identify Premier Banking members with their faces and enhance services for VIPs. Trial in Holland Village Branch. Real-time identification of VIPs as they enter the lounge. Customized service (preference of drinks, magazines) based on VIP data. Input of purpose of visit and feedback for future services. First bank in Singapore to use face recognition. Elevate customer experience using face recognition. 27 NEC Corporation 2018 NEC press release

28 Japan: Walk-through Entry (NEC in-house trial) Challenges Prevention of identity theft Employees need to stop at security gates for ID card authentication. Unable to prevent entry using someone else s employee card. Solution Results Neo Access Control for entry/ exit management. Efficient operation at the entrance with walk-through authentication. Matching of photos of employees captured at the gate against the database of preregistered employee face data. No need to stop in front of the camera. Trial with about 1,000 employees at the NEC Headquarter building in Tokyo. To improve practical technical performance and accumulate know-how for capturing good quality images for accurate identification of individuals. 28 NEC Corporation 2018 recognition for walk-through entry!

29 Japan: Payment Service (NEC in-house trial) Prevention of identity theft Challenges Solution Results Payments at the cashier takes too long. Fraud using stolen ID cards. Neo face recognition engine Payments via face recognition helps to improve business efficiency and ensures verification of the person s identity. Verifies identity by comparing faces captured at the POS terminal against the preregistered face images of employees. Feasibility of face recognition for cashless/ cardless payment was verified through the trail at shops in the NEC Headquarter building with 500 employees. To improve practical technical performance and accumulate operation know-how of recognition performance and operation load under various conditions in shops. Making cashless and cardless payments possible 29 NEC Corporation 2018 NEC press release

30 Bio-IDiom Biometric Authentication Technology 30 NEC Corporation 2018

31 Different biometric authentication technologies Characteristics of different biometric authentication Fingerprint recognition offers great convenience with high accuracy and ease of use. recognition is highly convenient in that it does not require any special actions Walk-through entry/ exit while holding your luggage, etc. High DNA Iris Vein Finger print Accuracy Palm print Otoacoustic Low Low 31 NEC Corporation 2018 Hand writing Voice NEC s key technology Convenience High *Source: Addition to Biometrics Market White Paper 2007 version Yano Research Institute, Ltd.

32 History of NEC s Biometric Authentication technology A pioneer with over 40 years of experience in R&D 2008: Developed finger hybrid recognition technology : Ranked No.1 in US Government benchmark testing Late 1990 s: Global deployment Early 1990 s: Criminal AFIS for states across US 1984: San Francisco Police Department 1982: Metropolitan Police Department (Japan) 2010 Multi-modal authentication Combination of various biometrics such as fingerprint, face, and iris. 2017: Ranked No.1 for the 4 th consecutive time in US Government benchmark testing 2009, 2010, and 2013: Ranked No.1 in US Government benchmark testing 2003 Global deployment 1999 Commercialization of face recognition 1996 Started 3D face recognition R&D Fingerprint 1971: Started research for fingerprint recognition 32 NEC Corporation : Started research for face recognition Wider range of application in our daily lives through enhancement of technology and combination of different modalities.

33 World-class Technology: US NIST* Benchmark Testing NIST:National Institute of Standards and Technology FpVTE2003 FpVTE2012 Slap Fingerprint Segmentation Evaluation 2004 MINEX2016 Fingerprint recognition Evaluation of Latent Fingerprint Technologies 2007(ELFT2007) NIST Proprietary Fingerprint Template Testing (PFT2009 PFTⅡ 2013) MBE recognition Multiple Biometric Grand Challenge 2009(MBGC2009) Multiple Biometrics Evaluation 2010(MBE2010) Vendor Test 2013(FRVT 2013) In Video Evaluation (FIVE) *Voice recognition technology was also ranked No1. *Iris recognition benchmark testing currently in progress. 33 NEC Corporation 2018

34 Detection of faces from images/ videos and analyzing features to identify individuals detection: Detect faces from images Matching: Verify if it is the same person Robustness against varying conditions Angle Infrared camera images DETECT Verify features MATCH s are recognized through 2 processes, face detection and face matching Detecting faces. (number of faces, position, size, face features, etc.) Matching faces to identify who it is. (Verifying face features, searching for matches in the database, showing results based on matching scores, etc.) Achieves high accuracy with robustness against varying environment and conditions. 34 NEC Corporation 2018 Lighting Expression Aging

35 Iris Matching of the iris features, muscle pattern around the pupil, to identify individuals. Iris Pupil Retina Extremely high accuracy and speed of recognition Contact-less, hands-free recognition in the same way as face recognition. Biometrics information is not left on the capturing device. Uses near infrared lighting (LED) and a camera, enabling use in dark locations. 35 NEC Corporation 2018

36 Fingerprint/palmprint recognition Analyzing fingerprint/ palmprint features extracted from finger/ palm for recognition. With its permanence and uniqueness, fingerprint and palmprint is used for applications with rigid recognition such as criminal investigation and National ID systems in Public Safety market worldwide. Original image Print images of individuals are irreversible [Protection of privacy] NEC s unique high-speed and highly accurate recognition technology. Abundant track record of installations around the world. Based on international standard for fingerprint/palm print, and minutia data formats and the data is compatible with other systems. 36 NEC Corporation 2018 Digitized data Original image is discarded after digitization Minutiae and related method Relation network Only the digitalized data is stored Registered data

37 Finger vein recognition For Japan domestic market only Detection finger vein patterns of the finger to identify individuals. Hybrid fingerprint recognition solution Combination of fingerprint and finger vein makes it difficult to forge or steal. It is used widely for access to PCs in governments and enterprises. Capable of reading fingerprint and finger vein information simultaneously by simply placing a finger over the reader. World s first finger hybrid identification technology for secure user authentication. High-speed and highly accurate recognition technology. Difficult to forge as it uses vein patterns inside a finger. Contactless capture of fingerprint and finger vein data, for hygienic benefits and protection of privacy (no data is left on the device surface). 37 NEC Corporation 2018

38 Voice recognition Picks up voice through a microphone and identify individuals by analyzing features. Voice database Verify A B C E D F G Recommended data size: seconds/person H Voice data of 10 seconds or more is recommended. Contact-less, hands-free recognition. Identifies an individual remotely through a telephone, etc. Not depend on the language spoken. No need for special devices (standard microphone on smart phone and tablet). 38 NEC Corporation 2018

39 Ear acoustic recognition using the shape of the ear cavity that are unique to each individual. Transmitted signal Analyzing the sound reflection patterns Hearable device A B Received Signal Identification using unique patterns C Peak of 5-8 khz (Supports distance of 2-3 cm to the ear drum) High-speed and highly accurate recognition technology. Contact-less, hands-free recognition. Applicable for locations where users wear masks or gloves, such as in hospitals. Highly secure method of authentication. High affinity for real life application, without the need to look at any screens, etc. 39 NEC Corporation 2018

40 Multi-modal authentication Multi-modal authentication by combining different biometric recognition modalities. Ear acoustic Iris Authentication by combining multiple modals Bio-IDiom User friendly + High accuracy/ security Voice Fingerprint/palm print Finger vein 40 NEC Corporation 2018

41

Combating Accuracy Issues in Biometric Solutions

Combating Accuracy Issues in Biometric Solutions NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018 Biometric Authentication

More information

Introduction to NEC s Public Safety Solutions

Introduction to NEC s Public Safety Solutions Introduction to NEC s Public Safety Solutions Takehiko Akiyama Manager, Transportation & City Infrastructure Div. NEC Corporation February 20 th 2018 Today s Agenda Introduction Law Enforcement Civil

More information

NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest

NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

UltraMatch. Standalone Iris Recognition System

UltraMatch. Standalone Iris Recognition System UltraMatch Standalone Iris Recognition System Smart LED Utilizes the most accurate biometric recognition technology Color LED shows the proper verification distance Mobile management enabled by wireless

More information

NIST Tests Supporting Biometric Identification Applications

NIST Tests Supporting Biometric Identification Applications NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National

More information

Creating Innovation through the Digitalization of Ekimachi Spaces

Creating Innovation through the Digitalization of Ekimachi Spaces FEATURED ARTICLES Social Innovation through Global Customer Co-creation Creating Innovation through the Digitalization of Ekimachi Spaces The collaborative creation of services in urban fields such as

More information

Introduction of Toshiba Face Recognition Software Toshiba Corporation 1

Introduction of Toshiba Face Recognition Software Toshiba Corporation 1 Introduction of Toshiba Face Recognition Software 2016 Toshiba Corporation 1 Why choose Toshiba s FRS? * Performance ** - NIST-Proven World Top Class Accuracy & Speed - 150 patents Experience - Over 1000

More information

A quick guide to iris recognition. Click on blue squares to navigate

A quick guide to iris recognition. Click on blue squares to navigate Click on blue squares to navigate Safe Accurate Fast Stable Scalable Reliable Non-invasive Personal identification... is key Identity authentication... is key Identity authentication... you are the key

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

Mobile ID, the Size Compromise

Mobile ID, the Size Compromise Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time

More information

Airport Security & Safety Thales, Your Trusted Hub Partner

Airport Security & Safety Thales, Your Trusted Hub Partner Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international

More information

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers

More information

Gaining Business Value from IoT

Gaining Business Value from IoT Gaining Business Value from IoT Digital Aviation Conference 2018 Thomas Bengs GM, Head of Biometrics EMEIA Enterprise Cybersecurity EMEIA Human Centric Innovation Co-creation for Success 0 2018 FUJITSU

More information

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Award-winning Contactless Authentication Technology Verifies An Individual s Identity by Recognizing Palm Vein Patterns enabling dynamic

More information

The face recognition company

The face recognition company The face recognition company 2 Cognitec develops market-leading face recognition technologies and applications for enterprise and government customers around the world. Cognitec develops a face recognition

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology

Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology Mobility Services for Better Urban Travel Experiences Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology The high level of progress in urban planning is being accompanied

More information

Fujitsu World Tour 2016

Fujitsu World Tour 2016 Fujitsu World Tour 2016 Human Centric Innovation in Action Utrecht 13 June 2016 0 Copyright 2016 FUJITSU Mobilizing the Enterprise One size does not fit all powered by 1 Copyright 2016 FUJITSU Speaker

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

The face recognition company

The face recognition company The face recognition company 2 Leading the Industry 3 Cognitec develops market-leading face recognition technologies and applications for enterprise and government customers around the world. Cognitec

More information

Identification or Verification? Advanced Identification Technology

Identification or Verification? Advanced Identification Technology Identification or Verification? Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining

More information

Human Identification Using Biometry

Human Identification Using Biometry Human Identification Using Biometry by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional. Fundamentals of Biometrics Biometry Definition Generic therm that describes

More information

NEC Australia Overview. au.nec.com

NEC Australia Overview. au.nec.com NEC Australia Overview au.nec.com 2 NEC Australia Overview NEC expertise and technology create a smarter future through innovative, effective ICT-enabled solutions for enterprises, businesses and government

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to

More information

Biometric Entry-Exit. July 11, 2017

Biometric Entry-Exit. July 11, 2017 Biometric Entry-Exit July 11, 2017 CBP Assumes Biometric Exit Mission in 2013 1996 Congress passed legislation mandating the creation of a biographic entry and exit system 2001 Post 9/11 Congress passed

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,

More information

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R Hassle-free banking in the DIGITAL AGE through NEXT-GEN Technologies W H I T E PA P E R Experience smooth transactions with the new generation of banking and payments using facial recognition. Financial

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Advances in Stand-off Biometrics

Advances in Stand-off Biometrics Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

Seoul e-government Policies & Strategies. Information System Planning Bureau

Seoul e-government Policies & Strategies. Information System Planning Bureau Seoul e-government Policies & Strategies Information System Planning Bureau > About Seoul No.6 Ranked 6th in Urban Competitiveness Worldwide ( 15) 90% More than 90% of Seoul citizens are Smart Phone Users

More information

Social Value Creation via IoT

Social Value Creation via IoT Social Value Creation via IoT Smart City, Enterprise and Service Solutions Kurt Jacobs kurt.jacobs@necect.com NEC Enterprise Communication Technologies 3 June 2016 The Earth in 2050 (Source:OECD, FAO,

More information

6 facts about GenKey s ABIS

6 facts about GenKey s ABIS 6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every

More information

The Role of Biometric Networks in Recognition of Person

The Role of Biometric Networks in Recognition of Person Communications 2015; 3(5): 81-85 Published online August 10, 2015 (http://www.sciencepublishinggroup.com/j/com) doi: 10.11648/j.com.20150305.11 ISSN: 2328-5966 (Print); ISSN: 2328-5923 (Online) The Role

More information

THE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors

THE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors THE BEST OF BOTH WORLDS Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security By Mahdi Mekic, NXP Semiconductors A new generation of contactless smartcards, built to support

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

HID goid Mobile ID Solution

HID goid Mobile ID Solution HID goid Mobile ID Solution Citizen ID Solutions Introducing HID goid for Citizen IDs on Smartphones HID goid platform for mobile IDs delivers the secure infrastructure to allow citizen ID s to be safely

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

Identity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp.

Identity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp. Identity and Access Management Michael Sheketoff Senior Solutions Architect, Unisys Corp. Agenda Unisys Step Zero Identification and Credentialing Who are you giving that badge to? Access Control logical

More information

Protecting your Privacy Winchester Cathedral Privacy Notice

Protecting your Privacy Winchester Cathedral Privacy Notice Protecting your Privacy Cathedral Privacy Notice Introduction Cathedral is committed to protecting the privacy of any personal information it may hold regarding individuals. This Privacy Note explains

More information

A Planet of Smarter Cities: Security and critical infrastructures impact

A Planet of Smarter Cities: Security and critical infrastructures impact A Planet of Smarter Cities: Security and critical infrastructures impact Alberto Barrientos Director of Public Sector IBM Smarter Cities Alberto.barrientos@es.ibm.com Urban population growth expected to

More information

The European Union approach to Biometrics

The European Union approach to Biometrics The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1

More information

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered The Identity as a Service Suite (IDaaSS) Solutions GUIDE Identity Credentials great looking secure ID credentials delivered www.idconcierge.com.au www.nxient.com nxient s Identity as a Service Suite (IDaaSS)

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Enabling Compliance for Physical and Cyber Security in Mobile Devices

Enabling Compliance for Physical and Cyber Security in Mobile Devices Enabling Compliance for Physical and Cyber Security in Mobile Devices Brandon Arcement & Chip Epps HID Global Sept 12, 2016 1630-1730 ET Agenda Smart Devices vs. Traditional Cards Mobility Infrastructure

More information

Internet of Things Towards a more collaborative model

Internet of Things Towards a more collaborative model i Internet of Things Towards a more collaborative model Brahim GHRIBI Head of Government Relations MEA NOKIA 1 Nokia 2017 Past has been about connecting people, the future is about connecting things Improving

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

INTUS 1600PS Palm Vein Authentication

INTUS 1600PS Palm Vein Authentication INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional

More information

Biometric Offender Movement

Biometric Offender Movement Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO 1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING. A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING www.consultmipl.com MIPL is a security consulting company from India, offering sustainable designs and solutions for security management.

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+

More information

Your single source for a safe, secure, and sustainable airport

Your single source for a safe, secure, and sustainable airport Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Presented By: Mr. Shishir Verma Vice President MapmyIndia (CE Info Systems Pvt. Ltd.) About Us Making Our World Better

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

Experian Fraud Prevention Solutions

Experian Fraud Prevention Solutions Experian Fraud Prevention Solutions FMVÖ Business Breakfast Cyber Crime prevention for the financial services industry 1 Experian Internal use only Introducing Experian 2 Experian Identity Theft is a Global

More information

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including

More information

STADIUM VIDEO SURVEILLANCE. with Logipix System. 1

STADIUM VIDEO SURVEILLANCE. with Logipix System.  1 STADIUM VIDEO SURVEILLANCE with Logipix System www.logipix.com 1 Main benefits 1. Stitched panoramic images up to 240 MP resolution cover the entire seating bowl 2. Recognizable faces at every seat in

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service 2018 FIFA World Cup Russia integrates safety, security and service Published on 18 Jun 2018 The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans

More information

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS Crossmatch s Michel Nerrant on Improving Security Without Adding Friction Michel Nerrant Nerrant is responsible for business

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Smart Mobile Identity. Revolutionizing biometric identity verification

Smart Mobile Identity. Revolutionizing biometric identity verification Smart Mobile Identity Revolutionizing biometric identity verification Introduction Mobile devices are poised to transform the biometric industry and greatly broaden the use of biometrics for identity verification.

More information

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

Defence, Safety and Security

Defence, Safety and Security Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts

More information

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY. Prepare + Prevent + Respond + Recover + Mitigate START WITH PREVENTION

UNCLASSIFIED//FOR OFFICIAL USE ONLY. Prepare + Prevent + Respond + Recover + Mitigate START WITH PREVENTION Current Partners UNCLASSIFIED//FOR OFFICIAL USE ONLY LA-SAFE Threat Groups Sectors Domestic Terrorism International Terrorism Gangs/Narcotics Violent/High Profile CI/KR Critical Infrastructure and Key

More information

HID goid Mobile ID Solution

HID goid Mobile ID Solution HID goid Mobile ID Solution Government ID Solutions It s Time for Mobile IDs HID Global is poised to lead this shift, providing the secure ecosystem needed to facilitate the provision of citizen IDs to

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES

SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES PAGE 1 INTRODUCTION In 1950, the fishing village of Shenzhen in south-east China had 3,148 inhabitants. By 2025 it is predicted that

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives

More information

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately

More information

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS Intelligent Video-based Security Platform for Mission Critical Systems Core Security System + Real Time + Intelligence + Integration + Reliability SECURITY PLUS INTRODUCTION ACTi Security

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information