De-duplication The Complexity in the Unique ID context
|
|
|
- Sylvia Holmes
- 10 years ago
- Views:
Transcription
1 De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance of birth certificate, voter identity card, ration card, driving license, passport, PAN card etc. In addition the government also implements different welfare schemes like Targeted Public Distribution System (TPDS), National Rural Employment Guarantee System (NREGS), health insurance, old age pensions etc for the economic and social upliftment of the people. A Unique Identity (UID) assigned for every citizen would obviate the need for a person to produce multiple documentary proofs of his identity for availing any government service, or private services like opening of a bank account. The Unique Identity (UID) would remain a permanent identifier right from birth to death of the citizen. UID would enable government to ensure that benefits under various welfare programmes reach the intended beneficiaries, prevent cornering of benefits by a few people and minimize frauds. UIDs are also expected to be of help in law and order enforcement, effective implementation of the public distribution system, defining social welfare entitlements, financial inclusion and improving overall efficiency of the government administration. 2. Enrollment It is expected that the Government will enroll the citizens by capturing the Biographic and Biometric details and issue a Unique ID number. During the enrollment process, it has to be ensured that the same citizen does not get enrolled more than once. This can be done by comparing the biometrics of the citizen with all other citizens already enrolled and denying enrollment in case a match is found. Enrollment of citizens can be done in two ways. (i) (ii) The enrollment can be done online by adopting a centralized architecture, in which all the enrollment stations in the country are connected to the central server and the biometrics of the citizen being enrolled are matched / compared with the biometrics of all the citizens already enrolled. In case a match is found, the system will not allow enrollment to be done. The other way in which enrollment can be done is by adopting an offline enrollment method by synchronizing the data with the central server De-duplication The complexity in the Unique ID Context Page 1 of 9
2 periodically as and when internet connectivity is available or through regular backup of data by means of DVDs / Hard disks. The biometrics of the citizens captured through the offline method are then matched / compared with the biometrics of all other enrolled citizens at the central server to identify multiple enrollments of the same citizen. What is important in both the cases is the speed of matching and the accuracy of the matching results. The speed of matching has to be very high as the number of citizens to be enrolled runs into millions. The accuracy is equally important as false matches will result in erroneous enrollments, delays and potential failure of the project itself. It is to be noted that, during the enrollment, the raw images of the biometrics are captured and algorithms are used for converting the images into templates which are used for comparison/ matching. The speed of matching and accuracy of matching depend on the biometric captured, the algorithm used and the matching engine deployed. 3. Biometrics There are several Biometrics such as Fingerprints, Iris, Facial recognition, Hand Geometry, Signature, Voice patterns etc. which are being used by Governments all over the world for an extensive array of highly secure identification and personal verification solutions. Each of them has certain advantages and disadvantages which must be considered in developing biometric systems. Selecting the right biometric is critical to the success of any Identity Management project such as the Unique ID project. Key metrics that need to be evaluated for choosing a biometric include the stability of the biometric over the lifetime of a human being, Failure to Enroll (FTE) rate, False Accept Rate (FAR), and the False Reject Rate (FRR). It is important to understand the advantages and disadvantages of each biometric and the advantages of going in for Multimodal Biometric solutions. 4. Multi-Modal Biometrics Multimodal biometrics refers to the use of a combination of two or more biometric modalities in a single identification system. Biometric systems based solely on onemodal biometrics are often not able to meet the desired performance requirements for large user population applications, due to problems such as failure to enroll, noisy data, spoof attacks, environmental conditions and unacceptable error rates. Each of the biometrics has its relative merits and applications where they can be used. A few examples are given below. De-duplication The complexity in the Unique ID Context Page 2 of 9
3 4.1. Face The face can be the first form of identifying a person without the need for any external device; however, a facial recognition camera may not be able to distinguish between identical twins. Facial recognition works on the system identifying 9 geometric points on a human face and international studies have confirmed very high False Acceptance Rates (1 in 100) Fingerprints Fingerprints are ideal for verification (1:1 matching) though there are Automatic Fingerprint Identification Systems (AFIS) which do identification (1:N or N:N) also. However, even in the case of identification, the False Acceptance Rates are about 1:100,000. Fingerprint de-duplication is cost effective only for small population and the cost of de-duplication goes up significantly due to manual intervention required while doing de-duplication for huge population. This is due to large number of false matches thrown up during the fingerprint de-duplication process requiring Human intervention / Back office operations to work on the probable matches and thereby adding up to the costs; Fingerprints are susceptible to noisy or bad data, such as inability of a scanner to read dirty fingerprints clearly. People above 60 years and young children below 12 years may have difficulty enrolling in a fingerprinting system, due to their faded prints or underdeveloped fingerprint ridges. It is estimated that approximately 5 percent of any population has unreadable fingerprints, either due to scars or aging or illegible prints. In the Indian environment, experience has shown that the failure to enroll is as high as 15% due to the prevalence of a huge population dependent on manual labor. However, the advantages of fingerprints are given below Fingerprint is cost effective at the time of verification. (Since at verification or the point of service, fingerprint devices of low cost can be used. Fingerprint can be used for forensic purposes Iris Iris recognition is the most accurate of the top three biometrics: fingerprints, facial recognition, and iris recognition. Iris recognition has a false accept rate of 1 in 1.2 million for one eye (1 in 1.44 trillion for two eyes) regardless of database size. As a result of the accuracy of Iris recognition, Iris returns a single result back. Fingerprint and face technologies generally return a De-duplication The complexity in the Unique ID Context Page 3 of 9
4 candidate list and then a manual process is required for resolving the candidate list. For this reason, Iris is the ideal biometric for applications which require real time identification. Processes such as fraud screen (to check for duplicates) enrollment for large populations can be easily handled by Iris recognition where they are very difficult for fingerprints. Iris recognition algorithms can search upto 20 million records in less than one second using a normal Quadcore 2 Processor blade server. In a parallel process, using COTS hardware, Iris can perform at 1 billion matches per second. The ability to search a population database in real time and return a single match result is unique to Iris recognition technology. Due to manual candidate list resolution with face and fingerprint technologies, Iris is the only biometric which delivers operational results in real time which can be acted upon. Iris is an internal organ because of which there is no problem of environmental conditions affecting the Iris unlike fingerprints which may not be prominent in people who do labor work or work in harsh environments (e.g factories, farms, etc). The Iris of a person is stable throughout a person s life (From the age of one year till death); the physical characteristics of the Iris do not change with age, diseases or environmental conditions. Hence one time enrollment is enough for a person during his lifetime. One of the most important advantages of using Iris as a Biometric is the lower effort, lesser infrastructure (servers, database licenses, datacenter infrastructure etc) required for de-duplication, whereas finger print deduplication requires more than 50 times infrastructure and more human effort. Another related cost that is normally overlooked is the infrastructure maintenance cost for running such as huge datacenter like, manpower, power consumption, annual maintenance costs for hardware and software etc. A comparative study of the performance of multiple biometrics done by the centre for Mathematics and Scientific Computing, National Physical Laboratory NPL of UK is given in the Table 1. De-duplication The complexity in the Unique ID Context Page 4 of 9
5 Table 1 Biometric FAR (False Acceptance Rate) FRR (False Rejection Rate) FER (Failure to Enroll rate) Scalability Stability Iris 1:1.2 million % 0.5% 1: all search Very stable Fingerprint 1: % % 1: 1 match Changes Facial 1:100 ~10% 0.0% 1:1 match Changes recognition Hand 1: % 0.0% 1:1 match Changes Geometry For complete Report Please Refer - Biometric Product Testing Final Report (19 March 2001, Center for Mathematics and Scientific Computing, National Physical Laboratory, UK). The most compelling reason to adopt Multi-Modal Biometric is to introduce certainty in the recognition process, real time identification, lower effort for deduplication and reduce the possibility of inconvenience caused by malfunctioning of a single Biometric. Advantages of using Multi-Modal Biometrics The enrollment cost for Multi-Modal Biometric enrollment will be about 5 10% marginally higher compared to single/dual biometric enrollment. However, the total cost of solution in case of multimodal enrollment is significantly reduced due to reduced cost during de-duplication which outweighs the marginal additional cost incurred during enrollment. Single biometric enrollment results in Failure to Enroll (FTE) if those biometric characteristics are absent in a citizen or if they are not qualified for enrollment (due to scars, aging or illegible/ worn out / cut / unrecognizable in case of fingerprints). In Indian conditions, where more than 60% of the population is involved in manual labour, experience has shown very high FTE rates for fingerprints. 5. De-duplication De-duplication is the processing of the biometric data of citizens to remove instances of multiple enrollments by the same citizen. During de-duplication, matching the biometrics of a citizen is done against the biometrics of other citizens to ensure that the same person is not enrolled more than once. This will ensure that each person De-duplication The complexity in the Unique ID Context Page 5 of 9
6 will have a unique identity. De-duplication will be a necessary component in the Unique ID project. De-duplication is discussed in the context of the two different enrollment scenarios which are given below. Case I: Enrollment using a centralized architecture In the case of enrollment using a centralized architecture, the biometrics of the citizen have to be matched against the biometrics of all the previously enrolled citizens. The matching has to be done soon after the biometrics are captured to check whether the same citizen has been enrolled earlier. In case a match is found, the citizen will not be enrolled into the system. To accomplish this, the speed of matching has to be very high and without any false accepts. To illustrate the complexity, let us take a case where 200 million citizens have already been enrolled, and a new citizen is now waiting to be enrolled into the system at the enrollment station. (1) When Fingerprints are used as the Biometric. The number of matches to be performed and the time taken is shown in the table below. Scenario No of matches No. of matches if 1 finger (say left thumb) is matched against all left thumbs of No. of matches if all 10 fingers are matched against the respective fingers of all the No. of matches if all the 10 fingers are matched against all the fingers of all the Time taken (Assuming 10 blade servers with a total matching capacity of 5 million per sec) 200 million 40 secs 2000 million million 400 secs (6.67 minutes) 4000 secs (1.11 hours) (2) When Iris is used as the Biometric. The number of matches to be performed and the time taken is shown in the table below. De-duplication The complexity in the Unique ID Context Page 6 of 9
7 Scenario No of matches No. of matches if 1 eye (say left eye)against all left eyes of No. of matches if both eyes are matched against the respective eyes of all the No. of matches if both eyes are matched against both eyes of all the previously enrolled citizens. Time taken (Assuming 10 blade servers with a total matching capacity of 200 million per sec) 200 million 1 sec 400 million 2 secs 800 million 4 secs Thus it can be seen that the Iris based online enrollment is many times faster compared to the fingerprint based enrollment. Moreover, the fingerprint based Deduplication throws up false matches which have to be crosschecked with the photo or other parameters before deciding the accuracy of the match. Case II: Enrollment using a De-centralized architecture In the case of enrollment using a De-centralized architecture, the biometrics of citizens captured during a certain period have to be matched against the unique ID enrollment database of all the. The matching has to be done by aggregating the data from each of the decentralized enrollment stations and matching against the de-duplicated biometrics of all the. To illustrate the complexity, let us take the case where 200 million citizens have already been enrolled, and a data of 1 million citizens has been aggregated from the enrollment stations. The data of the 1 million citizens will have to be matched against the 200 million citizens to avoid multiple enrollments. (1) When Fingerprints are used as the Biometric. The number of matches to be performed and the time taken is shown in the table below. De-duplication The complexity in the Unique ID Context Page 7 of 9
8 Scenario No. of matches if 1 finger (say left thumb) against all left thumbs of No. of matches if all 10 fingers are matched against the respective fingers of all the previously enrolled citizens No. of matches if all the 10 fingers are matched against all the fingers of all the No of matches Time taken (Assuming 10 blade servers with a total matching capacity of 5 million per sec) 200 trillion 463 days Or 1.27 years 2000 trillion 4630 days Or years trillion days Or years (2) When Iris is used as the Biometric. The number of matches to be performed and the time taken is shown in the table below. Scenario No of matches if 1 eye (say left eye)against all left eyes of previously enrolled citizens No of matches if both eyes are matched against the respective eyes of all the No of matches both eyes are matched against both eyes of all the previously enrolled citizens No of matches Time taken (Assuming 10 blade servers with a total matching capacity of 200 million per sec) 200 trillion days 400 trillion days 800 trillion days It can thus be seen that the de-centralised enrollment will lead to large deduplication times. By increasing the number of servers, it is possible to do the deduplication within a day. To achieve the same timelines using fingerprints, it would De-duplication The complexity in the Unique ID Context Page 8 of 9
9 take 50 times the number of servers adopted for Iris based De-duplication. In addition to the increase in timelines and hardware, the number of false matches thrown up in Fingerprint based De-duplication would require large manpower to use other comparisons such as photos to eliminate the false matches. 6. Conclusion Choosing the right biometrics plays a very important role for ensuring the success of the Unique ID project. While Iris as a biometric ensures high matching speeds and high degree of accuracy which are very essential for large Unique ID projects, fingerprint as a biometric will be economical for verification at the Point of Service. Thus the use of Multi-Modal biometrics will enable Governments to reap the advantages of both in the most optimal manner. De-duplication The complexity in the Unique ID Context Page 9 of 9
Very large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Technology behind Aadhaar. Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012
Technology behind Aadhaar Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
The Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Aadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Authentication Framework Version 1.0 Unique Identification Authority of India (UIDAI) Contents 1. Introduction... 3 2. Aadhaar Authentication... 4 3. Uses of Aadhaar Authentication... 5 4. Aadhaar
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals A. Tirupathi Rao 1, N. Pattabhi Ramaiah 1, Ahmed
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Operational Testing of Biometric Access Control Systems. National Safe Skies Alliance (NSSA)
Operational Testing of Biometric Access Control Systems by the National Safe Skies Alliance (NSSA) Presented By: Valerie M. Lively, TSA Biometric Consortium Conference September 22 24, 2003 Transportation
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Secured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Respected Sir, Subject: Reg. e-bharat: Integrated e-payment and e-governance system.
From Santhosh Hebbar, Date: 24-04-2015 Kumbar Jaddi, Hitlalli, Yellapur, Uttar Kannada, Karnataka-581347 To THE PRIME MINISTER, Prime Minister's Office, South Block, Raisina Hill, New Delhi-110011 Respected
Computers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
IDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Personal National Identification System National Population Registry Mexico
Personal National Identification System National Population Registry Mexico January 21st, 2010 1 Operational Diagram Identity Card 1. Birth Certificate 2. Enrollment process 3. Secure Channel 4. Data Bases
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Recommendations for Performance Benchmarking
Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Biometric Authentication. Biometric Consortium Conference Tampa
Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents
Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions
Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
TABLE OF CONTENTS SL CONTENT PAGE NO. 1 INTRODUCTION 1 2 OBJECTIVE OF SCHEME 1 3 BENEFITS OF SCHEME 2 4 ELIGIBILITY OF SCHEME 2 5 INSURANCE COVERAGE
TABLE OF CONTENTS SL CONTENT PAGE NO. 1 INTRODUCTION 1 2 OBJECTIVE OF SCHEME 1 3 BENEFITS OF SCHEME 2 4 ELIGIBILITY OF SCHEME 2 5 INSURANCE COVERAGE 3 6 PREMIUM FOR RSBY 3 7 MAJOR STAKE HOLDERS 3 8 ROLES
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS USER BIOMETRIC DATA ACQUISITION OPERATOR BIOMETRIC IDENTIFICATION OPERATOR DOCUMENT VERIFICATION OPERATOR VIDEO ANALYTICS OPERATOR FINGERPRINT AND FACE EXPERTS
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Social Protection delivery systems with a focus on identification. Robert Palacios, Lead Pension Specialist, World Bank Washington, December 2014
Social Protection delivery systems with a focus on identification Robert Palacios, Lead Pension Specialist, World Bank Washington, December 2014 What we will cover I. Unbundling processes in order to find
NOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI)
UNIQUE INDENTIFICATION AUTHORITY OF INDIA PLANNING COMMISSION GOVERNMENT OF INDIA 3 rd Floor, Tower-II, Jeevan Bharati Building, Connaught Circus, New Delhi - 110 001 NOTICE INVITING APPLICATIONS FOR HIRING
Internet Banking: Risk Analysis and Applicability of Biometric Technology for Authentication
Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 67-78 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Review Paper Internet Banking:
Training Module on Aadhaar Enrolment Process
Training Module on Aadhaar Enrolment Process UIDAI Unique Identification Authority of India Preface This training manual introduces the learner to the Aadhaar enrolment process. The module is meant to
Seema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire
Seema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire {Seema.Sundara, Timothy.Chorma, Ying.Hu, Jagannathan.Srinivasan}@oracle.com
Border control using biometrics in Japan. September 2008 NEC Corporation/Daon
Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., [email protected]
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
REAL ID Act Title II H.R.1268
H.R.1268 Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005 (Enrolled as Agreed to or Passed by Both House and Senate) TITLE II--IMPROVED SECURITY
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
AADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
Expertise for biometric solution
Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
White paper. Biometrics and the mitigation of card-related fraud
White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities
IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities Morpho Driver s license Solution for governments and road traffic authorities Governments are looking for an
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
ALLEGION: SCHLAGE HANDPUNCH GUIDEBOOK
GUIDEBOOK ALLEGION: SCHLAGE HANDPUNCH GUIDEBOOK July 2014 Document o170 2014 Nucleus Research, Inc. Reproduction in whole or in part without written permission is prohibited. THE BOTTOM LINE Using biometrics
Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy
Chapter 12 Objectives Chapter 12 Computers and Society: and Privacy p. 12.2 Identify the various types of security risks that can threaten computers Recognize how a computer virus works and take the necessary
DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)
DATA PROTECTION UNIT OPERATIONS AND PROGRAMME IMPLEMENTATION DIRECTORATE OFFICE OF THE PRIME MINISTER MALTA DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs) INTRODUCTION It is within
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
Module: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
Jan Kremer s Data Center Design Consultancy
Jan Kremer s Data Center Design Consultancy Datacenter Design Jan Kremer has designed a Tier Level 3 Datacenter for one of the main banks in Saudi Arabia This included Floor Plans, Power Requirements,
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
Application form WH1_en_011115 Application for residence and work permit for Working Holiday
Application form WH1_en_011115 Application for residence and work permit for Working Holiday Uses This form can be used to apply for a residence and work permit in Denmark, if you are an Argentine, Australian,
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Virtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
RealTime Time & Attendance
RealTime Time & Attendance Contents Credentials Understanding You Our recommended solution What this means to you 2 Content Official distributors for IR hand reader range Official distributors and technical
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025 Phone: 0484-2333603 Email: [email protected] Requirement of biometric time attendance system
