Examples of Large Scale Biometrics Systems:

Size: px
Start display at page:

Download "Examples of Large Scale Biometrics Systems:"

Transcription

1 Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian and David Hall Sep 23,2002 Insert Creator Initials and Date Motorola Document Classification, File Name, Rev Number MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. Motorola, Inc

2

3 Applications: Border Security Refugee Verification Immigration Criminal ID Civil ID

4 Example: Guatemala s National Passport Network User s fingerprint captured at local office Compared against fingerprint database in Guatemala Verifies identities for benefits recipients Printrak provides multiple countrywide identification systems San Francisco Guatemala s Guatemala s National National Passport Passport Network Network Los Angeles Houston Guatemala s Central Site Chicago Boston Miami

5 Example: Argentina Largest civil records system of its kind in the world Intended for a national database of Argentina's 40 million+ citizens Individuals are verified by fingerprint, photo image and other identification mechanisms. Processes up to 35,000 searches per day Capable of searching through 2 million fingerprint records per second Allows Argentina to combat identity fraud accurately, efficiently and cost-effectively.

6 Canada s AFIS Network Surete du Quebec, Montreal Service de Police de la Communaute de Montreal Toronto Police Service British Columbia Ottawa Police Service Durham Regional Police Service, Oshawa Peterborough-Lakefield Regional Police Ontario Provincial Police, Orillia York Regional Police, North york Peel Regional Police, Mississaugua Halton Police Service, Oakville Hamilton Police Service, Hamilton Niagara Regional Police, St. Catharines Windsor Police, Windosr

7 El Salvador National ID Card 10,000 new 2 finger records per day Response times of less than 1 minute 28 Registration Centers Total System of 2 million fingerprint records Renew ID Card every other year 2D Bar Code with minutiae Uses of ID are growing

8 What have we learned from implementing these large scale AFIS Systems? Technology needed to implement International Security Mandates Large Background Databases Image Quality Infrastructure

9 Technologies needed to Implement International Security Mandates Accurate, easy to use, cost-effective, multiple biometrics ID System Tamper-proof biometrics technology Intelligent Common Information Model for database interoperability IT infrastructure for supporting massive processing and data interchange Application infrastructure for easy adaptation to multiple applications using the same or similar tool sets and framework Common globally accepted standards Secure and easy ways to exchange information for rapid search results

10 Large Background Databases We have built systems that can handle databases varying in size from 2 Million to 40 million ten print records We have implemented systems that can handle 10,000 to 30,000 or more transactions per day. Future databases could be as large as 600 million to 1 billion ten print records and may need to support 100 K to 1 million transactions per day. Very high ten print accuracy against large databases is a must The need for fully automated ( Lights Out Systems ) biometrics systems Inter-connectivity between local databases and national databases Need for very high speed matchers to provide fast response time

11 Image Quality State-of-the-Art Optical, ultrasound and chip sensors Ten print devices and single finger devices Image quality is always of major importance Challenges We need better more robust image sensors Seeking robust automatic image quality control to address user needs Do we want cheap live scan systems or intelligent booking stations?

12 MOTOROLA and the Stylized M Logo are registered in the U.S. Patent & Trademark Office. All other product or service names are the property of their respective owners. Motorola, Inc Infrastructure Architecture Modular Re-configurable Flexible Workflow Maximize throughput Mobile Connectivity Secure and universal access Multiple Biometrics Face Palm prints Iris

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric

More information

Cultural Diversity May Be Increasing in Both Canada and the United States, But Important Differences Remain. By Dr. Doug Norris

Cultural Diversity May Be Increasing in Both Canada and the United States, But Important Differences Remain. By Dr. Doug Norris Cultural Diversity May Be Increasing in Both Canada and the United By Dr. Doug Norris Table of Contents Introduction... 3 U.S. Cultural Diversity... 3 Table 1... 4 Table 2... 5 Cultural Diversity in Canada...

More information

MORPHO CRIMINAL JUSTICE SUITE

MORPHO CRIMINAL JUSTICE SUITE MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background

More information

Biometric Template Protection & Usage

Biometric Template Protection & Usage Protection & Usage September 23, 2002 Colin Soutar, CTO Bioscrypt Inc. Consortium Conference (BC2002) Company Overview Definition of Terms User Identifier Protection Conclusions 2 Mytec Technologies Inc.

More information

Age Verification for Children: A Survey of Tools and Resources. Jules Polonetsky

Age Verification for Children: A Survey of Tools and Resources. Jules Polonetsky Age Verification for Children: A Survey of Tools and Resources Jules Polonetsky Self Verification The site asks the user to input their birth date in a neutral way, and if the user is underage, a session

More information

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

FOI request 0906-14 Work experience, interns and related temporary positions

FOI request 0906-14 Work experience, interns and related temporary positions FOI request 0906-14 Work experience, interns and related temporary positions British Embassy / High Commission / Consulate / Contracted Contract started (from 1 September Contract ended / due to Rate of

More information

BC SERVICES CARD DIRECTION

BC SERVICES CARD DIRECTION BC SERVICES CARD DIRECTION TO: THE PROVINCIAL IDENTITY INFORMATION SERVICES PROVIDER DIRECTION: 1/12 SUBJECT: Direction to the Provincial Identity Information Services Provider respecting the BC Services

More information

Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group 2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group Approach and Agenda Workshop Goal: An open discussion on the future of

More information

Personal National Identification System National Population Registry Mexico

Personal National Identification System National Population Registry Mexico Personal National Identification System National Population Registry Mexico January 21st, 2010 1 Operational Diagram Identity Card 1. Birth Certificate 2. Enrollment process 3. Secure Channel 4. Data Bases

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification. Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

PERSONAL IDENTITY INFORMATION DIRECTION

PERSONAL IDENTITY INFORMATION DIRECTION PERSONAL IDENTITY INFORMATION DIRECTION TO: THE INSURANCE CORPORATION OF BRITISH COLUMBIA DIRECTION: 1/13 SUBJECT: Direction on Identity-Proofing Applicants for the BC Services Card AUTHORITY: This direction

More information

Workshops Consultation Certification

Workshops Consultation Certification Workshops Consultation Certification September 2014 - December 2015 T h e s o u r c e f o r s e r v i c e s d e s i g n e d t o e n h a n c e t h e l i v e s o f individuals with autism and related disabilities

More information

Architectural hardware consulting services

Architectural hardware consulting services Architectural hardware consulting services Architectural hardware consulting services Door hardware may only be a small percentage of the cost of the design and construction process, but it encompasses

More information

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document

More information

SWGFAST. Defining Level Three Detail

SWGFAST. Defining Level Three Detail SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail

More information

Defining AFIS Latent Print Lights-Out

Defining AFIS Latent Print Lights-Out NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint

More information

Immigration and Work Permit Considerations

Immigration and Work Permit Considerations doing business in Canada 46 g Immigration and Work Permit Considerations Canada s immigration legislation and programs are designed to assist the entry into Canada of business people and foreign skilled

More information

THE QUÉBEC PRIVATE SECURITY ACT

THE QUÉBEC PRIVATE SECURITY ACT AUGUST 2010 THE QUÉBEC PRIVATE SECURITY ACT AND ITS APPLICATION TO ELECTRONIC SECURITY FIRMS Construction, Engineering, Surety and Fidelity Group CONSTRUCTION LAW BULLETIN www.blgcanada.com In 2004 the

More information

IDENTITY SOLUTIONS FOR A BETTER WORLD

IDENTITY SOLUTIONS FOR A BETTER WORLD IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric

More information

Access to Basic Banking Services

Access to Basic Banking Services Access to Basic Banking Services Opening a personal deposit account and cashing Government of Canada cheques or other instruments In order to improve access to basic banking services, legislation requires

More information

Recruiting Information Systems Analysts and Consultants in Canada, the United States, the United Kingdom and Ireland

Recruiting Information Systems Analysts and Consultants in Canada, the United States, the United Kingdom and Ireland Recruiting Information Systems Analysts and Consultants in Canada, the United States, the United Kingdom and Ireland Demand for Information Systems Analysts in Calgary Information Systems Analysts and

More information

Opportunities Ontario: Provincial Nominee Program Overview

Opportunities Ontario: Provincial Nominee Program Overview Opportunities Ontario: Provincial Nominee Program Overview Temporary Foreign Worker Seminar Windsor, ON March 26, 2013 2 What is Opportunities Ontario? Opportunities Ontario: Provincial Nominee Program:

More information

L-1 IDENTITY SOLUTIONS, INC.

L-1 IDENTITY SOLUTIONS, INC. L-1 IDENTITY SOLUTIONS, INC. FORM 10-K (Annual Report) Filed 02/28/08 for the Period Ending 12/31/07 Address 177 BROAD STREET STAMFORD, CT 06901 Telephone 203-504-1100 CIK 0001018332 Symbol ID SIC Code

More information

INVESTOR PRESENTATION NYSE:IDN. October 28, 2015

INVESTOR PRESENTATION NYSE:IDN. October 28, 2015 INVESTOR PRESENTATION NYSE:IDN October 28, 2015 Safe Harbor Statement Certain statements in this presentation constitute forward-looking statements within the meaning of the Private Securities Litigation

More information

Doing Business in Canada. SCG Legal Annual Meeting Vancouver, British Columbia September 2015

Doing Business in Canada. SCG Legal Annual Meeting Vancouver, British Columbia September 2015 Doing Business in Canada SCG Legal Annual Meeting Vancouver, British Columbia September 2015 Introduction World s second largest country by area As of July 1, 2014 the population was estimated at 35,540,400

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Recruiting Drafting Technologists and Technicians in Canada, the United States, the United Kingdom and Ireland

Recruiting Drafting Technologists and Technicians in Canada, the United States, the United Kingdom and Ireland Recruiting Drafting Technologists and Technicians in Canada, the United States, the United Kingdom and Ireland Demand for Drafting Technologists and Technicians in Calgary Drafting Technologists and Technicians

More information

ID Document Scanning and Biometric Solutions

ID Document Scanning and Biometric Solutions ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Re-Settlers: The Secondary Migration of Immigrants Between Canada s Cities Jack Jedwab Executive Director Association for Canadian Studies

Re-Settlers: The Secondary Migration of Immigrants Between Canada s Cities Jack Jedwab Executive Director Association for Canadian Studies Re-Settlers: The Secondary Migration of s Between Canada s Cities Jack Jedwab Executive Director Association for Canadian Studies Immigration is an important source of growth for Canada s cities. s tend

More information

Biometrics in Identity as a Service

Biometrics in Identity as a Service Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions

More information

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/

More information

t6000 client and server software Transaction and archiving software for the 21st century

t6000 client and server software Transaction and archiving software for the 21st century t6000 client and server software Transaction and archiving software for the 21st century Kodak t6000 client and server software turns paper checks to ready cash in hours, not days Check processing takes

More information

IMMIGRATION Canada. Study Permit. Lima Visa Office Instructions. Table of Contents IMM 5833 E (05-2016)

IMMIGRATION Canada. Study Permit. Lima Visa Office Instructions. Table of Contents IMM 5833 E (05-2016) IMMIGRATION Canada Table of Contents Document Checklist Study Permit Study Permit Lima Visa Office Instructions This application is made available free by Immigration, Refugees and Citizenship Canada and

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Ontario Health Insurance Plan

Ontario Health Insurance Plan Chapter 4 Section 4.08 Ministry of Health and Long-Term Care Ontario Health Insurance Plan Follow-up on VFM Section 3.08, 2006 Annual Report Chapter 4 Follow-up Section 4.08 Background The Ministry of

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

Canadians divided on satisfaction with immigration policy. Unsure 15% Dissatisfied 20% Somewhat satisfied

Canadians divided on satisfaction with immigration policy. Unsure 15% Dissatisfied 20% Somewhat satisfied Immigration Policy Canadians divided on satisfaction with immigration policy QUESTION: Are you satisfied, somewhat satisfied, somewhat dissatisfied or dissatisfied with the federal government s immigration

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION

FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION A technique data sheet presented by The Fraud Practice LLC. Fraud Technique: Identity Document Verification Author: David Montague Identity Document Verification

More information

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric

More information

Modular biometric architecture with secunet biomiddle

Modular biometric architecture with secunet biomiddle Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information

More information

TORONTO TRANSIT COMMISSION REPORT NO.

TORONTO TRANSIT COMMISSION REPORT NO. Form Revised: February 2005 TORONTO TRANSIT COMMISSION REPORT NO. MEETING DATE: March 1, 2011 SUBJECT: POST-SECONDARY STUDENT METROPASS ELIGIBILITY ACTION ITEM RECOMMENDATION It is recommended that the

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Privacy by Design The case of Automated Border Control Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Overview: (Automated) border control; Identity management in (Automated)

More information

Secure communications via IdentaDefense

Secure communications via IdentaDefense Secure communications via IdentaDefense How vulnerable is sensitive data? Communication is the least secure area of digital information. The many benefits of sending information electronically in a digital

More information

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Biometric Systems Biometrics

More information

APPLIED BACHELOR S DEGREES OFFERED AT CANADIAN COLLEGES Selected programs

APPLIED BACHELOR S DEGREES OFFERED AT CANADIAN COLLEGES Selected programs EMBASSY OF THE STATE OF KUWAIT CULTURAL DIVISION 3500 International Drive, N.W., Washington, D.C. 20008 Telephone: (202) 364-2100 Fax: (202) 363-8394/ (202) 362-4379 APPLIED BACHELOR S DEGREES OFFERED

More information

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS...

More information

Day-to-Day Banking. Opening a Personal Deposit Account or Cashing a Federal Government Cheque at Scotiabank. Cheque Holding Policy

Day-to-Day Banking. Opening a Personal Deposit Account or Cashing a Federal Government Cheque at Scotiabank. Cheque Holding Policy Day-to-Day Banking Opening a Personal Deposit Account or Cashing a Federal Government Cheque at Scotiabank Cheque Holding Policy Opening A Personal Deposit Account We make it easy to open a personal deposit

More information

Biometrics Planning Project. Biometrics Field Trial. Evaluation Report

Biometrics Planning Project. Biometrics Field Trial. Evaluation Report Biometrics Planning Project Biometrics Field Trial Evaluation Report Her Majesty the Queen in Right of Canada, represented by the Minister of Public Works and Government Services Canada, 2008. Cat. no.

More information

Using the Cloud to Drive Revenue in Financial Services/Insurance Fujitsu Alliance with salesforce.com

Using the Cloud to Drive Revenue in Financial Services/Insurance Fujitsu Alliance with salesforce.com Using the Cloud to Drive Revenue in Financial Services/Insurance Fujitsu Alliance with salesforce.com Why Fujitsu? Fujitsu is a large, successful company but without the attitude.. In business for 75 years,

More information

Application form WH1_en_011115 Application for residence and work permit for Working Holiday

Application form WH1_en_011115 Application for residence and work permit for Working Holiday Application form WH1_en_011115 Application for residence and work permit for Working Holiday Uses This form can be used to apply for a residence and work permit in Denmark, if you are an Argentine, Australian,

More information

Architectural Hardware Consulting Services

Architectural Hardware Consulting Services Architectural Hardware Consulting Services Door hardware may only be a small percentage of the cost of the design and construction process, but it encompasses 90 percent of what s touched in a building

More information

Open Government and Information Management. Roy Wiseman Executive Director, MISA/ASIM Canada CIO (Retired), Region of Peel roy.wiseman@outlook.

Open Government and Information Management. Roy Wiseman Executive Director, MISA/ASIM Canada CIO (Retired), Region of Peel roy.wiseman@outlook. Open Government and Information Management Roy Wiseman Executive Director, MISA/ASIM Canada CIO (Retired), Region of Peel roy.wiseman@outlook.com Open Government Defined Government of Canada defines Open

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Rapid Transit Backgrounder

Rapid Transit Backgrounder Rapid Transit Backgrounder Moving Forward On Rapid Transit The concept of a Rapid Transit System for Winnipeg has been debated for over 30 years. City Council and the Province of Manitoba have demonstrated

More information

Bio-ID: Biologically Inspired Identification and Recognition System

Bio-ID: Biologically Inspired Identification and Recognition System International Journal of Computer and Information Technology (ISS: 2279 0764) Bio-ID: Biologically Inspired Identification and Recognition System E. O. woye, Department of Biomedical Engineering, College

More information

MANITOBA S SCHEDULE OF CRIMINAL ORGANIZATIONS: PROFILE OF THE HELLS ANGELS MOTORCYCLE CLUB

MANITOBA S SCHEDULE OF CRIMINAL ORGANIZATIONS: PROFILE OF THE HELLS ANGELS MOTORCYCLE CLUB MANITOBA S SCHEDULE OF CRIMINAL ORGANIZATIONS: PROFILE OF THE HELLS ANGELS MOTORCYCLE CLUB The Hells Angels Motorcycle Club (Hells Angels or HAMC) is the largest outlaw motorcycle gang in the world, with

More information

New Mobile App. Virtual Inspector revolutionizes vehicle inspections

New Mobile App. Virtual Inspector revolutionizes vehicle inspections New Mobile App Virtual Inspector revolutionizes vehicle inspections Vehicle inspections don t have to be timeconsuming and costly. New technologies and analytics are making them easy and inexpensive. Underwriters

More information

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS USER BIOMETRIC DATA ACQUISITION OPERATOR BIOMETRIC IDENTIFICATION OPERATOR DOCUMENT VERIFICATION OPERATOR VIDEO ANALYTICS OPERATOR FINGERPRINT AND FACE EXPERTS

More information

Voice Authentication On-Demand: Your Voice as Your Key

Voice Authentication On-Demand: Your Voice as Your Key Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

Energy Management Solutions for a Better and Greener Government

Energy Management Solutions for a Better and Greener Government Energy Management Solutions for a Better and Greener Government Better Facilities. Better Environments. Better Performance. From energy efficient buildings and green technology to new procurement processes

More information

Please Refer to Attached Sample Form

Please Refer to Attached Sample Form Pacific Gas and Electric Company San Francisco, California U 39 Revised Cal. P.U.C. Sheet No. 32117-E Cancelling Revised Cal. P.U.C. Sheet No. 22732-E Electric Sample Form No. 79-858 ID Theft Affidavit

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

Biometric Authentication. Biometric Consortium Conference Tampa

Biometric Authentication. Biometric Consortium Conference Tampa Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

4. CASH INVESTMENTS AND LOANS RECEIVABLE (AS AT 6 NOVEMBER 1998) 1. Finance Commissioner s report dated 26 Nov 98 is immediately attached.

4. CASH INVESTMENTS AND LOANS RECEIVABLE (AS AT 6 NOVEMBER 1998) 1. Finance Commissioner s report dated 26 Nov 98 is immediately attached. 4. CASH INVESTMENTS AND LOANS RECEIVABLE (AS AT 6 NOVEMBER 1998) COMMITTEE RECOMMENDATION That Council receive this report for information. DOCUMENTATION: 1. Finance Commissioner s report dated 26 Nov

More information

The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing

The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes Identity Theft and Phishing July 2009 What Is Identity Theft? Identity theft is a serious crime

More information

Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals

Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals executive summary Identity management and verification depend on trusted credentialing technologies.

More information

Citizen s perceptions on digital identity

Citizen s perceptions on digital identity Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are

More information

Security of Identity Management. Professor Brian Collins

Security of Identity Management. Professor Brian Collins Security of Identity Management Professor Brian Collins Headline issues Purpose of ID management and ID security Practical process and technology issues Enrolment processes Identity verification Limitations

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

September 27, 2011 JAPAN BORDER CONTROL SYSTEM (J-BIS) UPDATE

September 27, 2011 JAPAN BORDER CONTROL SYSTEM (J-BIS) UPDATE September 27, 2011 JAPAN BORDER CONTROL SYSTEM (J-BIS) UPDATE Today s Agenda 1. Who is NEC? 2. Overview of the Project 3. Challenges and Lessons Learnt NEC Corporation Total revenue 2010: $38.5 billion

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

WHERE DEALS GET DONE.

WHERE DEALS GET DONE. WHERE DEALS GET DONE. MANUFACTURING DISTRIBUTION Why are our results better? Because our approach is. Flexibility. Experience. Commitment. That s What Sets Us Apart. At PNC Business Credit, we know how

More information

York Region Cloud Computing & Data Centres Expand Your Business In the Greater Toronto Area Canada

York Region Cloud Computing & Data Centres Expand Your Business In the Greater Toronto Area Canada York Region Cloud Computing & Data Centres Expand Your Business In the Greater Toronto Area Canada CANADA: $5 BILLION DATA CENTRES & CLOUD COMPUTING MARKET he Canadian market is underserved Geoff Hamspon,

More information

APPLICATION FOR REGISTRATION:

APPLICATION FOR REGISTRATION: APPLICATION FOR REGISTRATION: POSTGRADUATE EDUCATION - 2015 CANADIAN MEDICAL SCHOOL GRADUATES MATCHED TO AN ONTARIO RESIDENCY PROGRAM Dear Applicant: The College is pleased to provide this application

More information