Very large scale systems
|
|
|
- Benedict Bridges
- 10 years ago
- Views:
Transcription
1 Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1
2 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large scale biometric systems Vs. Big data system 2
3 Large scale biometric systems and philosophy First thing that comes to our mind, large databases (tens or hundreds of millions) Reliable identification Scalability (Volume) Identification requests (Velocity) handle False Acceptance Rate (FAR) with database size increase (Veracity) Robust and tolerant to hardware failures Velocity Volume 3
4 Large scale biometric systems and philosophy Large Scale Biometric system Large database Reliable Identification 4
5 Rome wasn t built in a day, but they were laying bricks every hour Why are they taking data? Will my data be secured? Design Enrollment Will Iris devices burn my eyes? Is this going to happen? Storage Volume Velocity 5
6 Large scale biometric system challenges o Biometric system Design challenges Purpose and use - proper guidelines and limits of usage Biometric modalities Which subset of people involved? Vendor lock in Proof of Concept study helps in evaluating technical, operational and behavioral hypotheses Mexico national ID(MNID) 6
7 Large scale biometric system challenges o Biometric enrollment challenges (Client side) Inclusion of all Biometric Failure to Enroll (FTE) Ease of use Even 4 year kid should be able to understand instructions Quality Standardized process, strong quality measures (IREX II) and operator training (IREX V) Iris capture failure cases* FTE Enrollment during UID project *Images from G. W. Quinn, J.Matey, Elham Tabassi, and P. Grother IREX V Guidance for iris Image Collection,
8 Large scale biometric system challenges o Biometric data storage and matching challenges Compression Following certain standards(kind-7) for best use Biometric accuracy degrades with increase of database Providing highest accuracy with confidence Very high data and throughput Use of multi-modal, multi-identification systems(abis). Volume Velocity Iris Accuracy Statistics KIND 2 (Size ~300KB) KIND 7 (Size ~ 2.5KB) KIND 7 (Size ~ 3.5KB) True Accept Rate 99.30% 97.93% 99.13% 8 * UIDAI Reference documents KIND-7 IRIS Authentication Accuracy PoC Report May
9 Large scale biometric system challenges o Data security/privacy Complete secure cycle (enrollment, communication, storage, matching and entire back-end system) Spoofing during authentication and interception during communication Quality check and anti-spoofing techniques during enrollment encrypted templates and beyond (cancelable biometrics) Visual cryptography to safeguard stored databases 9
10 Large scale biometric system challenges o Open dissemination Keeping data secret could suggest systems are not secure, may hide out poor error rates, be behind schedule and speculations Open dissemination helps information flow between research, industry and government 10 Image taken from
11 Large scale biometric system challenges System design Enrolment process Storage and matching procedures Data security Open dissemination 11
12 Successful large scale biometric system Large Scale Biometric System Large database Reliable Identification Policy making Large scale biometric system is not only characterized by big numbers But with reliable identification And proper policy making which address challenges 12
13 Large scale biometric system example Case of State Government of Andhra Pradesh, India An estimate of 83M people in the state in 2005 Subsidies for low income Low income people are identified through Ration cards before 2005* Sample Ration card * 13 * Zelazny, Frances. The Evolution of India's UID Program. Lessons Learned and Implications for Other Developing Countries. s.l. : Center For Global Development, August 2012.
14 Large scale biometric system example Case of Andhra Pradesh, India (Survey on Ration card system) Only 42% of the subsidies reached target audience 86M ration cards for 83M population in 2005 State Government of Andhra Pradesh decided to issue cards based on iris recognition The system was designed to check for duplicates(de-duplication) in the database using iris recognition during enrollment In the first few years, 56 Million records were enrolled 14 * Zelazny, Frances. The Evolution of India's UID Program. Lessons Learned and Implications for Other Developing Countries. s.l. : Center For Global Development, August 2012.
15 Andhra Pradesh s failure Failure of the system After a few thousand enrollments system failed as millions of duplicate enrollments made in to the database Initial back end technology solution was not designed to scale properly Fraudulent practices during enrollment by operators No Iris readers to subsidy providers to make sure target audience enjoys Andhra Pradesh s Large Scale system Large database Reliable Identification Policy making 15
16 Large scale biometric system example Case of Andhra Pradesh, India In 2008, a new contract was established for the de-duplication of iris database and for new enrollments Of 56 Million iris database, after de-duplication around 7.6 Million fake beneficiaries have been discovered. Experience helped Indian Government built one of the most efficient very large scale biometric system through Unique Identity program(aadhar). 16 * Zelazny, Frances. The Evolution of India's UID Program. Lessons Learned and Implications for Other Developing Countries. s.l. : Center For Global Development, August 2012.
17 Very large scale biometric system Unique Identification Authority of India(UIDAI) under program AADHAR It s the largest biometric ID program in the world so far Aimed towards 1.2billion population Multimodal which include iris, face, and fingerprints But uses iris and fingerprint for identification/de-duplication De-duplication(1:N matches) is done on every new enrollment 17
18 Iris in large scale biometric systems Suggestions to include Iris : - Ensure low biometric failure to enroll rate because of lack of good quality fingerprint - Increase the accuracy of the system Proof-of-Concept Study (PoC): The UIDAI conducted a Proof-of-Concept study Iris enrollment took less than a minute to capture and could be captured effectively from people, even from those who were blind. Children between 4-15 years could be biometrically enrolled correctly The accuracy levels achieved with a combination of fingerprint and iris is more than 10X. 18 * UIDAI Reference documents Ensuring Uniqueness: Collecting iris biometrics for the Unique ID Mission
19 Current status of AADHAR As of June 11, 2014 more than 635 million people have been enrolled. Avg. of 1 Million enrollees per day Every enrollee has to be compared with all the enrolled templates on the database Total number of cross-comparisons done is around 635 trillion per day and increasing. Large database Reliable identification Policy making 19
20 Reliable identification in Large scale biometric systems Scalability Adding load to the system shouldn t decrease it s performance Redundancy Able to handle sudden increase in identification requests High Availability No single point of failure 20
21 Large scale iris matching engines Specifications 40 Million iris codes 240 Matches per second Database Containing Iris Codes Matcher Server Iris Loader Loads iris codes on to RAM Typical server contains 48GB of RAM ~ 40 Million iris codes Iris Matcher Using cores of the server tries to match iris codes Xeon Processor E5500 with 12 cores, 2.6MHz can match ~240 probe iris codes 21
22 Large scale iris matching engines Performance 40 Million iris codes 240 Matches per second Database Containing Iris Codes Matcher Increase in database reduces the performance Scalability Increase in number of match requests Failure of server Redundancy High Availability 22
23 Large scale iris matching engines Scalability Performance 80 Million iris codes 240 Matches per second Matcher 1 Matcher 2 Database Containing Iris Codes Controller 23
24 Large scale iris matching engines Redundancy Performance 80 Million iris codes 480 Matches per second Group 1 Load Balancer Matcher 1-1 Matcher 1-2 Group 2 Matcher 2-1 Matcher 2-2 Database Containing Iris Codes Controller 24
25 Large scale iris matching engines High Availability Group 1 LB-1 Matcher 1-1 Matcher 1-2 LB-2 Group 2 Matcher 2-1 Matcher 2-2 Database Containing Iris Codes Controller 25
26 Large scale iris matching engines Partial failure support LB-1 Matcher 1-1 Matcher 1-2 Matcher 1-3 LB-2 Matcher 2-1 Matcher 2-2 Matcher 2-3 Database Containing Iris Codes Controller 26
27 Demo Environment Iris Matcher1 + Controller Iris Matcher2 + Controller Iris Matcher1 + Controller Iris Matcher2 + Controller 27
28 28 Deployments
29 United Arab Emirates Expellee Program Since 2003 all borders and jails use Iris devices to enroll deported persons Each airport counter has iris devices which provide 1:N matches on backend system Till 2006, Iris records enrolled are more than 840,751* Number of iris comparisons performed- 6.3 billion/day in all-against-all search mode Catches/day * A.N. Al-Raisi and A.M. AL-Khouri, Iris recognition and the challenge of homeland and border control security in UAE, Telematics and Informatics , 2008
30 Mexico National ID program Issue a citizen identity cards containing biometric information Create a new database to identify up to 110 million citizens using iris, fingerprint & facial biometric data Started first to youth 4-17 ages, Achieved 30 million till date Average of 50,000 match requests per day 30
31 Qatar Qatar National Id and Travelers Project National and resident ID card projected to be 2million Frequent Traveler for the citizens and residents First Passport program in the world to store iris image on the epassport Enrollment is performed on each passenger upon arrival 20,000 per day 31
32 32 Thank you everyone
33 Big Data system Vs Large scale biometric system Big Data Volume Velocity Variety Correlation within data Large scale biometric Volume Velocity Veracity Identify a person 33
34 Iris ID Products Hardware Products Software Products icam7000 series icam4000 series (discontinued) idata EAC idata Iris SDK icam TD100 icam H100 idata Eclipse (ISO compliant SDK) icam Manager icam 7000 Series icam T10 icam D1000 IrisAccelerator INSiDE icap Iris Workstation idata SDK Device Controller)(s) 34
35 IrisAccelerator V6 for large scale systems High Speed Huge Capacity Backend Matching System IrisAccelerator System Software, IrisAccelerator SDK, Device Manager Remote Control and Manage through TCP/IP Network Unlimited Scale for National ID Local Database Management Load Balancing & Failover Hamming Distance Threshold Configurable Realtime System Monitoring High Security Level - PKI Based Dual Certification, SSL, Triple-DES Encryption (Communication), AES Encryption (Iris Information). High Speed Matching - Matching 10 million Record sin 1 second Redundancy Blade - Works In case of Emergency 35
36 36 IrisAccelerator V6 Two Variants
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Biometric Authentication. Biometric Consortium Conference Tampa
Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents
Technology behind Aadhaar. Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012
Technology behind Aadhaar Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
NOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI)
UNIQUE INDENTIFICATION AUTHORITY OF INDIA PLANNING COMMISSION GOVERNMENT OF INDIA 3 rd Floor, Tower-II, Jeevan Bharati Building, Connaught Circus, New Delhi - 110 001 NOTICE INVITING APPLICATIONS FOR HIRING
Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals A. Tirupathi Rao 1, N. Pattabhi Ramaiah 1, Ahmed
Coesys Border Management
Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,
Optical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Coesys Border Management
Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Authentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
CRVS and Identity Management
INFORMATION NOTE D CRVS and Identity Management I. Purpose This is a non-official document, for information only, prepared by the Working group of coorganizers of the Ministerial Conference on Civil Registration
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Installation and Configuration of Aadhaar Enrolment Client
Installation and Configuration of Aadhaar Enrolment Client UIDAI Unique Identification Authority of India Version: 2.0.0.2 Release date: 27-11-2012 Preface This training manual contains the detailed steps
IDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric
AADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.
Biometric Security: Client-Server Systems Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 [email protected] The Session Private vs Public / Personal vs Public Forms
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation
Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role
Aadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Authentication Framework Version 1.0 Unique Identification Authority of India (UIDAI) Contents 1. Introduction... 3 2. Aadhaar Authentication... 4 3. Uses of Aadhaar Authentication... 5 4. Aadhaar
IT Infrastructure Management
IT Infrastructure Management Server-Database Monitoring An Overview XIPHOS TECHNOLOGY SOLUTIONS PVT LIMITED 32/3L, GARIAHAT ROAD (SOUTH) KOLKATA 700 078, WEST BENGAL, INDIA WWW.XIPHOSTEC.COM Xiphos Technology
The Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
AlphaTrust PRONTO - Hardware Requirements
AlphaTrust PRONTO - Hardware Requirements 1 / 9 Table of contents Server System and Hardware Requirements... 3 System Requirements for PRONTO Enterprise Platform Software... 5 System Requirements for Web
Border control using biometrics in Japan. September 2008 NEC Corporation/Daon
Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System
Public Versus Private Cloud Services
Public Versus Private Cloud Services Table of Contents vs. What constitutes a Public Cloud versus a Private Cloud solution? When considering moving to a public Cloud infrastructure, what questions should
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution
April 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality
Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company
Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several
AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction
AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction 2 Introduction Biometric Attendance System based on Aadhaar Authentication Attendance System with real time monitoring Comprehensive
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Product Definition Bode Collection Point software is used to collect and report personal information and other meta
Procedure for obtaining Biometric Device Certification (Authentication)
Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Load Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.
DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable
Personal National Identification System National Population Registry Mexico
Personal National Identification System National Population Registry Mexico January 21st, 2010 1 Operational Diagram Identity Card 1. Birth Certificate 2. Enrollment process 3. Secure Channel 4. Data Bases
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
for Lync Interaction Recording
for Lync Interaction Recording Who is Numonix Our Company Numonix is an innovator in the development of interaction recording and quality management solutions. Our systems are deployed globally in contact
ClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
Xirrus Management System
DATASHEET Xirrus Management System The Xirrus Management System is a wireless network lifecycle management platform enabling network administrators to efficiently operate, configure and maintain Xirrus
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
MS-50412 - Implementing Active Directory Federation Services 2.0 for Windows Server 2008
MS-50412 - Implementing Active Directory Federation Services 2.0 for Windows Server 2008 Table of Contents Introduction Audience Prerequisites At Course Completion Student Materials Course Outline Introduction
Centralized Orchestration and Performance Monitoring
DATASHEET NetScaler Command Center Centralized Orchestration and Performance Monitoring Key Benefits Performance Management High Availability (HA) Support Seamless VPX management Enables Extensible architecture
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
Dragon NaturallySpeaking and citrix. A White Paper from Nuance Communications March 2009
Dragon NaturallySpeaking and citrix A White Paper from Nuance Communications March 2009 Introduction As the number of deployed enterprise applications increases, organizations are seeking solutions that
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution
September 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Introduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7
Introduction 1 Performance on Hosted Server 1 Figure 1: Real World Performance 1 Benchmarks 2 System configuration used for benchmarks 2 Figure 2a: New tickets per minute on E5440 processors 3 Figure 2b:
Agenda. Three License Types Concepts for ThinManager Licensing License Activation Demo
Licensing Agenda Three License Types Concepts for ThinManager Licensing License Activation Demo Three Licenses ACP ThinManager Allows terminal to boot Microsoft Allows terminals to start sessions Application
Larger, active workgroups (or workgroups with large databases) must use one of the full editions of SQL Server.
Installing ManagePro 12.1 in Shared Database (Workgroup) Mode Overview 1 ManagePro 12.1 can be operated in Workgroup (also known as remote client ) mode where it accesses a shared SQL database in a LAN
POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
Cloud-Based Identity Services
Cloud-Based Identity Services TrustX Technologies, Inc. 11325 Random Hills Rd., Suite 650 Fairfax, VA 22030 TrustX Identity Services Affordable Identity Assurance TrustX is a cloud-based implementation
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
DEDICATED MANAGED SERVER PROGRAM
DEDICATED MANAGED SERVER PROGRAM At Dynamic, we understand the broad spectrum of issues that come with purchasing and managing your own hardware and connectivity. They can become costly and labor intensive
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group
2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group Approach and Agenda Workshop Goal: An open discussion on the future of
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
Online Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
Biometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...
SierraVMI Sizing Guide
SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
