SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Business Case:
Executive Summary 
e-ID is the electronic counterpart to a national identification card (NIC). In a changing world moving more towards online based services in both the public and private sectors, an ID is more than a proof of identity. The M2SYS AFIS e-ID solution can serve in multiple sectors (e.g. social security, education, telephony services, banking services, taxation) depending on the context of the deployment. 
www.m2sys.com 
2
Problem Statement 
Developments of biometric technology are no longer in an embryonic stage and have been used successfully in the context of ID documents for over 10 years (28 January 2002) where approximately 89.5 million cards have been issued as of 2012. 33 National e-ID projects have already deployed and another 22 are in definition/specification phase and the e-ID system as a whole has few drawbacks. However, issues like data protection, privacy, information liability, access authority, and the quality of authentication remain heavily disputed issues. 
Political Issues 
Legal Issues 
Infrastructure Issues 
Privacy Issues 
Drawbacks 
www.m2sys.com 
3
eID Goals & Objectives 
Stop illegal immigration 
Prevent unauthorized access 
Increase document security 
Reduce terrorism threats 
Reduce potential acts of crime such as murder, robbery, drug trafficking 
Ensure better citizen benefits 
More effective implementation of law & justice 
Improved governance 
www.m2sys.com 
4
Global e-ID Deployments 
www.m2sys.com 
5 
Source: https://www.tractis.com/countries
Benefits of using e-ID 
Supporting e-services - simplifying access 
Ensure better citizen benefit program 
Improving national security 
Increasing administrative efficiency and reducing cost 
Limiting possibilities for fraud, identity theft, and phishing 
Establishing a population database 
Supporting mutual recognition in cross-border situations 
www.m2sys.com 
6
The M2SYS e-ID Solution 
Multi Modal AFIS: Includes facial recognition and iris recognition 
One-to-many (1:N) matching system in standard M2SYS AFIS Server 
Provides system access to other departments or organizations 
Multi-platform, scalable cluster architecture for parallel matching 
SSL/TLS connectivity for secure communication 
AES-256 based data encryption 
www.m2sys.com 
7
One ID – Many Applications 
Application Layer of M2SYS e-ID 
Border Control 
e-passport 
National ID 
Voter Registration 
Latent Print 
Health Care & Welfare 
Public Safety 
Biometric Overview 
•Iris 
•Palm Vein 
•Fingerprint 
•Facial Capture 
Matching System 
•One-to-many Matching System 
•One-to-many Biometric Matching 
•Multi-platform for Parallel Matching 
One Biometric Database 
www.m2sys.com 
8
Recommended Uses for M2SYS e-ID 
www.m2sys.com 
e-ID Core purpose: identify and authenticate citizens 
eSocial 
Access to social security services 
eHealth Access to health care services 
Public Safety Identifying criminal, forgery protection, & identity theft 
eVoting 
Registering to vote, and voting in elections to promote fairness 
Move from simple identification to multi-purpose card 
Broad coverage of governmental and private areas 
Driver: Create added value for the citizen 
M2SYS e-ID: One Card Multiple Use 
9
Conclusion 
Growing security problems around the world are leading to more frequent requests for proof of identity. Biometrics in the context of ID documents has been researched and deployed for the last 10 years, proving to be an efficient, effective, and secure way to manage identities. The adoption rate of biometric e-IDs are increasing across the globe as more governments discover their advantages and the M2SYS e-ID is a biometric national ID solution that is designed to meet the evolving identity needs of any country. It’s fault tolerant architecture, disk mirroring, automated database backups, and disaster recovery options provides a secure national population register. 
www.m2sys.com 
10
Contact Us 
Corporate Headquarter: 
1050 Crown Pointe Pkwy. 
Suite 850 
Atlanta, GA 30338 
USA 
Asia Office: 
House-279, Road-19, 
Mohakhali DOHS, 
Dhaka 1216 
Bangladesh 
E-mail: info@m2sys.com 
Phone: +1 (770) 393 0986 
Website: www.m2sys.com 
Get Social: 
Facebook: https://www.facebook.com/m2sys 
Twitter: @M2SYS 
LinkedIn: http://www.linkedin.com/company/m2sys-technology 
Blog: blog.m2sys.com 
YouTube: http://www.youtube.com/m2sys 
Google+: https://plus.google.com/M2SYS/ 
www.m2sys.com 
11

Mais conteúdo relacionado

Destaque

The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
Amusement park industry in india
Amusement park industry in india Amusement park industry in india
Amusement park industry in india Gopal Sarkar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Chainer入門と最近の機能
Chainer入門と最近の機能Chainer入門と最近の機能
Chainer入門と最近の機能Yuya Unno
 

Destaque (12)

The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
Amusement park industry in india
Amusement park industry in india Amusement park industry in india
Amusement park industry in india
 
Piston less pump
Piston less pumpPiston less pump
Piston less pump
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Sop for security
Sop for securitySop for security
Sop for security
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Chainer入門と最近の機能
Chainer入門と最近の機能Chainer入門と最近の機能
Chainer入門と最近の機能
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 

Mais de M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Mais de M2SYS Technology (17)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Benefits of Using Biometric Identification Management for eID Initiatives

  • 2. Executive Summary e-ID is the electronic counterpart to a national identification card (NIC). In a changing world moving more towards online based services in both the public and private sectors, an ID is more than a proof of identity. The M2SYS AFIS e-ID solution can serve in multiple sectors (e.g. social security, education, telephony services, banking services, taxation) depending on the context of the deployment. www.m2sys.com 2
  • 3. Problem Statement Developments of biometric technology are no longer in an embryonic stage and have been used successfully in the context of ID documents for over 10 years (28 January 2002) where approximately 89.5 million cards have been issued as of 2012. 33 National e-ID projects have already deployed and another 22 are in definition/specification phase and the e-ID system as a whole has few drawbacks. However, issues like data protection, privacy, information liability, access authority, and the quality of authentication remain heavily disputed issues. Political Issues Legal Issues Infrastructure Issues Privacy Issues Drawbacks www.m2sys.com 3
  • 4. eID Goals & Objectives Stop illegal immigration Prevent unauthorized access Increase document security Reduce terrorism threats Reduce potential acts of crime such as murder, robbery, drug trafficking Ensure better citizen benefits More effective implementation of law & justice Improved governance www.m2sys.com 4
  • 5. Global e-ID Deployments www.m2sys.com 5 Source: https://www.tractis.com/countries
  • 6. Benefits of using e-ID Supporting e-services - simplifying access Ensure better citizen benefit program Improving national security Increasing administrative efficiency and reducing cost Limiting possibilities for fraud, identity theft, and phishing Establishing a population database Supporting mutual recognition in cross-border situations www.m2sys.com 6
  • 7. The M2SYS e-ID Solution Multi Modal AFIS: Includes facial recognition and iris recognition One-to-many (1:N) matching system in standard M2SYS AFIS Server Provides system access to other departments or organizations Multi-platform, scalable cluster architecture for parallel matching SSL/TLS connectivity for secure communication AES-256 based data encryption www.m2sys.com 7
  • 8. One ID – Many Applications Application Layer of M2SYS e-ID Border Control e-passport National ID Voter Registration Latent Print Health Care & Welfare Public Safety Biometric Overview •Iris •Palm Vein •Fingerprint •Facial Capture Matching System •One-to-many Matching System •One-to-many Biometric Matching •Multi-platform for Parallel Matching One Biometric Database www.m2sys.com 8
  • 9. Recommended Uses for M2SYS e-ID www.m2sys.com e-ID Core purpose: identify and authenticate citizens eSocial Access to social security services eHealth Access to health care services Public Safety Identifying criminal, forgery protection, & identity theft eVoting Registering to vote, and voting in elections to promote fairness Move from simple identification to multi-purpose card Broad coverage of governmental and private areas Driver: Create added value for the citizen M2SYS e-ID: One Card Multiple Use 9
  • 10. Conclusion Growing security problems around the world are leading to more frequent requests for proof of identity. Biometrics in the context of ID documents has been researched and deployed for the last 10 years, proving to be an efficient, effective, and secure way to manage identities. The adoption rate of biometric e-IDs are increasing across the globe as more governments discover their advantages and the M2SYS e-ID is a biometric national ID solution that is designed to meet the evolving identity needs of any country. It’s fault tolerant architecture, disk mirroring, automated database backups, and disaster recovery options provides a secure national population register. www.m2sys.com 10
  • 11. Contact Us Corporate Headquarter: 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 USA Asia Office: House-279, Road-19, Mohakhali DOHS, Dhaka 1216 Bangladesh E-mail: info@m2sys.com Phone: +1 (770) 393 0986 Website: www.m2sys.com Get Social: Facebook: https://www.facebook.com/m2sys Twitter: @M2SYS LinkedIn: http://www.linkedin.com/company/m2sys-technology Blog: blog.m2sys.com YouTube: http://www.youtube.com/m2sys Google+: https://plus.google.com/M2SYS/ www.m2sys.com 11