SlideShare uma empresa Scribd logo
1 de 23
Central, Distributed, Multi-biometric, Multiple Application Server A NSW Case Study using multiple biometrics, multiple applications and 100,000+ users.
Background How do biometrics fit? Cost and complexity of securing applications Establishing integrity across numerous processes and rules Protecting investments Future proofing 2/16/2010 2
Corrective Services NSW An early adopter of biometrics A commercial focus Explored many technologies and applications 2/16/2010 3
Corrective Services NSW Imperatives Wrongful release Mitigating multiple identities Numerous applications Connect information with operations 2/16/2010 4
Some Variables 30+ sites Broad geography Scaling to 500,000+ users Government network No COTS available Variety in backend environment Multiple biometric technologies Multiple applications Multiple vendors 2/16/2010 5
Corrective Services NSW Concept: Single Point of Biometric Truth A single identity marker regardless of biometric type or application Available in near real time across the whole network Underpins various DCS business processes 2/16/2010 6
Corrective Services NSW Capabilities Accept other systems without design/integration overheads Future proofed Scale to 500,000+ Network performance not impact it Redundancy across all sites 2/16/2010 7
Design Process Single Point of Biometric Truth Nothing off the shelf No clarity around business rules Multiple companies 2/16/2010 8
What Was Built? A “single point of biometric truth” which: Accepts data from various biometric hardware vendors Accepts proprietary software applications  Provides near real time (NRT) updates remote data bases 2/16/2010 9
What is AKITA? AKITA is a biometric identification clearing house AKITA  assigns a unique id (UID) to each user, regardless of where they are enrolled or by which biometric device. AKITA  contains customer defined data: ,[object Object]
Photograph
User group
 Scanned image of documents' relating to user enrolment2/16/2010 10
Site 2 Site 3 Site 4 Site 1 Site 5 During the day users at Site 1 are enrolled using biometric Type A (in this example, iris)and third party application type A. At Site 5 users are enrolled using Biometric Type B (in this example Fingerprint) and third party  application type B. All sites enrol new users. All are subscribers to the  SPOBT Service Site 6 Site 7 Site 9 Site 8
Site 2 After hours, all sites are polled by the SPOBT. Each site gets notification from the SPOBT service separately as configured using the SPOBT Admin Tool on a specific interval or on a daily  basis. All new data is collected and returned to the central server. A SPOBT UID is assigned to all  new users. Site 3 Site 4 Site 1 Site 5 Site 6 Site 7 Site 9 Site 8
All sites are then warned “stand by”  to receive all updates from  all sites. i.e. each site is about  to be  delivered a fully  replicated copy of  the SPOBT. SPOBT can be hosted through WCF over TCP or WSDL through HTTP Security in the SPOBT can be set to one of the following: Windows Integrated RSA Certificate SSL Custom Site 2 Site 3 Site 4 Site 1 Site 5 Site 6 Site 7 Site 9 Site 8
Site 2 All changes and updates from all sites then returned to every other site, along with the unique ID (UID) assigned by the SPOBT. So if I enrolled with isay, Iris Type A at site 1 on Monday I can be recognised with Iris Type B on Site 5 on Tuesday. (or at an interval as short as  60 seconds. Users define the interval). Site 3 Site 1 Site 4 Site 5 Site 6 Site 7 Site 9 Site 8
Case Study Corrections NSW Glen Innes Brewarrina Grafton Tabulam Kemsey Tamworth Broken Hill Parramatta Muswellbrook Cessnock Parklea Wellington Lithgow Kariong Silverwater Ivanhoe Oberon Silverwater Womens Bathurst MRRC Emu Plains ,[object Object]
500,000+ users
Two types of iris recognition cameras
One type of fingerprint Reader
Three different proprietary application layersLong Bay John Moroney Kirkconnell Dillwynia Berrima Goulburn Junee Central Server Mannus Cooma Correctional Centre
2/16/2010 16

Mais conteúdo relacionado

Semelhante a Multiple Biometrics Case Study With 100,000+ Users

Automated Blood Bank System using Raspberry Pi
Automated Blood Bank System using Raspberry PiAutomated Blood Bank System using Raspberry Pi
Automated Blood Bank System using Raspberry PiIRJET Journal
 
Interfacing BLE with android based device
Interfacing BLE with android based device  Interfacing BLE with android based device
Interfacing BLE with android based device IEI GSC
 
A prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noA prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noDavidNereekshan
 
The Internet of Things Journey
The Internet of Things JourneyThe Internet of Things Journey
The Internet of Things JourneyDr. Mazlan Abbas
 
Journey Towards Industry 4.0 With IoT
Journey Towards Industry 4.0 With IoTJourney Towards Industry 4.0 With IoT
Journey Towards Industry 4.0 With IoTDr. Mazlan Abbas
 
Providing location based information advertising for existing
Providing location based information advertising for existingProviding location based information advertising for existing
Providing location based information advertising for existingAvelin Huo
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USBijtsrd
 
Network Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior ModelingNetwork Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior ModelingFahim Kawsar
 
An Efficient Tracking System for Air and Sound.pdf
An Efficient Tracking System for Air and Sound.pdfAn Efficient Tracking System for Air and Sound.pdf
An Efficient Tracking System for Air and Sound.pdfAakash Sheelvant
 
Iot based urban gardening project foe college
Iot based urban gardening  project foe collegeIot based urban gardening  project foe college
Iot based urban gardening project foe college201roopikha
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsnSajida Imran
 
Architecting Platforms for Innovation
Architecting Platforms for InnovationArchitecting Platforms for Innovation
Architecting Platforms for Innovationindiastack
 
Data Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of ThingsData Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of ThingsVMware Tanzu
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...TELKOMNIKA JOURNAL
 
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...WSO2
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream ComputingIRJET Journal
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 

Semelhante a Multiple Biometrics Case Study With 100,000+ Users (20)

Automated Blood Bank System using Raspberry Pi
Automated Blood Bank System using Raspberry PiAutomated Blood Bank System using Raspberry Pi
Automated Blood Bank System using Raspberry Pi
 
Interfacing BLE with android based device
Interfacing BLE with android based device  Interfacing BLE with android based device
Interfacing BLE with android based device
 
A prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noA prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_no
 
The Internet of Things Journey
The Internet of Things JourneyThe Internet of Things Journey
The Internet of Things Journey
 
Journey Towards Industry 4.0 With IoT
Journey Towards Industry 4.0 With IoTJourney Towards Industry 4.0 With IoT
Journey Towards Industry 4.0 With IoT
 
Providing location based information advertising for existing
Providing location based information advertising for existingProviding location based information advertising for existing
Providing location based information advertising for existing
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USB
 
Network Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior ModelingNetwork Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior Modeling
 
An Efficient Tracking System for Air and Sound.pdf
An Efficient Tracking System for Air and Sound.pdfAn Efficient Tracking System for Air and Sound.pdf
An Efficient Tracking System for Air and Sound.pdf
 
Iot based urban gardening project foe college
Iot based urban gardening  project foe collegeIot based urban gardening  project foe college
Iot based urban gardening project foe college
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
Multisink based approach for continous object tracking wsn
Multisink based approach for continous object tracking  wsnMultisink based approach for continous object tracking  wsn
Multisink based approach for continous object tracking wsn
 
Architecting Platforms for Innovation
Architecting Platforms for InnovationArchitecting Platforms for Innovation
Architecting Platforms for Innovation
 
Data Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of ThingsData Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of Things
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
 
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...
Introduction to Big Data Analytics: Batch, Real-Time, and the Best of Both Wo...
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream Computing
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in Banking
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 

Multiple Biometrics Case Study With 100,000+ Users

  • 1. Central, Distributed, Multi-biometric, Multiple Application Server A NSW Case Study using multiple biometrics, multiple applications and 100,000+ users.
  • 2. Background How do biometrics fit? Cost and complexity of securing applications Establishing integrity across numerous processes and rules Protecting investments Future proofing 2/16/2010 2
  • 3. Corrective Services NSW An early adopter of biometrics A commercial focus Explored many technologies and applications 2/16/2010 3
  • 4. Corrective Services NSW Imperatives Wrongful release Mitigating multiple identities Numerous applications Connect information with operations 2/16/2010 4
  • 5. Some Variables 30+ sites Broad geography Scaling to 500,000+ users Government network No COTS available Variety in backend environment Multiple biometric technologies Multiple applications Multiple vendors 2/16/2010 5
  • 6. Corrective Services NSW Concept: Single Point of Biometric Truth A single identity marker regardless of biometric type or application Available in near real time across the whole network Underpins various DCS business processes 2/16/2010 6
  • 7. Corrective Services NSW Capabilities Accept other systems without design/integration overheads Future proofed Scale to 500,000+ Network performance not impact it Redundancy across all sites 2/16/2010 7
  • 8. Design Process Single Point of Biometric Truth Nothing off the shelf No clarity around business rules Multiple companies 2/16/2010 8
  • 9. What Was Built? A “single point of biometric truth” which: Accepts data from various biometric hardware vendors Accepts proprietary software applications Provides near real time (NRT) updates remote data bases 2/16/2010 9
  • 10.
  • 13. Scanned image of documents' relating to user enrolment2/16/2010 10
  • 14. Site 2 Site 3 Site 4 Site 1 Site 5 During the day users at Site 1 are enrolled using biometric Type A (in this example, iris)and third party application type A. At Site 5 users are enrolled using Biometric Type B (in this example Fingerprint) and third party application type B. All sites enrol new users. All are subscribers to the SPOBT Service Site 6 Site 7 Site 9 Site 8
  • 15. Site 2 After hours, all sites are polled by the SPOBT. Each site gets notification from the SPOBT service separately as configured using the SPOBT Admin Tool on a specific interval or on a daily basis. All new data is collected and returned to the central server. A SPOBT UID is assigned to all new users. Site 3 Site 4 Site 1 Site 5 Site 6 Site 7 Site 9 Site 8
  • 16. All sites are then warned “stand by” to receive all updates from all sites. i.e. each site is about to be delivered a fully replicated copy of the SPOBT. SPOBT can be hosted through WCF over TCP or WSDL through HTTP Security in the SPOBT can be set to one of the following: Windows Integrated RSA Certificate SSL Custom Site 2 Site 3 Site 4 Site 1 Site 5 Site 6 Site 7 Site 9 Site 8
  • 17. Site 2 All changes and updates from all sites then returned to every other site, along with the unique ID (UID) assigned by the SPOBT. So if I enrolled with isay, Iris Type A at site 1 on Monday I can be recognised with Iris Type B on Site 5 on Tuesday. (or at an interval as short as 60 seconds. Users define the interval). Site 3 Site 1 Site 4 Site 5 Site 6 Site 7 Site 9 Site 8
  • 18.
  • 20. Two types of iris recognition cameras
  • 21. One type of fingerprint Reader
  • 22. Three different proprietary application layersLong Bay John Moroney Kirkconnell Dillwynia Berrima Goulburn Junee Central Server Mannus Cooma Correctional Centre
  • 25. 2/16/2010 18 Multiple applications, biometrics, systems and sites
  • 26. 2/16/2010 19 Multiple applications, biometrics, systems and sites = potential multiple identities
  • 27. 2/16/2010 20 AKITA allows flexibility of applications and biometrics yet ensures a single identity
  • 29. Summary A functional, working, central biometric clearing house Multiple biometrics and multiple applications When supporting Corrections business processes, eliminates identity fraud on their networks Protects previous and future investments 2/16/2010 22