SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
BIOMETRICAL IDENTITY
MULTI-MODAL SOLUTIONS
BIMS BIOMETRIC DATA ACQUISITION
BIMS Biometric Data Acquisition is an application for persons’ biographical and biometrical data
collection in real time or from existing file (pictures, ten print cards etc.) and transmission to Central
Biometric System, with persons’ verification and identification functionality.
Application provides unified and intuitive user interface, in order to quickly and easily collect biographical
and biometrical data to person case, and send it to central system.
Biometric data enrollment, identification and verification does not bring the best impact if the quality of
the captured data is not assessed right. Therefore BIMS Biometric Data Acquisition application conducts
automatic quality assessment and control in real-time of obtained biometrical elements, as well as
performs duplicate and elements consistency check, and obtained biometrical data segmentation.
•	 The BIMS application can be used by any authorized organization to perform biometrical data
collection, as well as to identify or verify person.
•	 Mostly current application is being used by police stations to register new criminals and collect
their biometrical data.
•	 The application is very useful for document issuing organizations, to collect civil person’s data.
The main application advantage is that it is not dependent from any specific hardware manufacturer
for biometrical data collection, or biometrical algorithms providers, which allows to use and integrate
application with different devices and algorithms. As well one of the application functions provides the
ability to automatically add person to centralized wanted person list, or check it in background mode
against this list, when the new biometrical data or person case is being enrolled to the system.
The application encapsulates all of the person’s data and supported biometry data in a NIST 2011 file
standardized by the ANSI/NIST organization.
In addition application has the management functionality for the centralized wanted person list and
automatic alert system. Therefore the provided functionality allows to add new person cases to the
wanted person list, as well as to modify and delete current cases from the list. Also, its functionality
provides the ability to control the automatic alert system, which sends out the notifications (e-mail, SMS)
to different law enforcement organizations or person’s about the possible matches, in order to allow
them to focus on the identified wanted person.
Benefits of the BIMS Biometric Data Acquisition application:
•	 Unified platform for multiple biometric modalities;
•	 Not dependent from any specific hardware manufacturers or biometrical algorithms providers;
•	 Adjustable biometric quality thresholds for many needs;
•	 Biometric data transmission files standardized by the ANSI/NIST organization for a secured data
transfer;
•	 Watchlist feature for centralized wanted people list management functionality;
•	 Automatic alerting system by e-mail or SMS when a wanted person is detected.
BIMS IDENTITY CASE MANAGEMENT APPLICATION
BIMS Identity Case Management application is centralized control and monitoring tool of all biometrical
identities collected and stored in Central Biometric System. The main functionality of it allows to resolve
different biometrical and biographical conflicts, to search and compare person cases, and also to modify
and delete person cases. As well the current application automatically saves and stores history of each
person case changes, which enables to see how, when and by whom the person case has been modified.
In addition the BIMS Identity Case Management application provides cooperation and data exchange
with experts which allows, for example, to send two person cases for comparison to biometrical data
expert, and to receive expert conclusion about the similarity of both cases. Also the BIMS application
provides person identification in Central Biometric System and other external systems. For example,
the Identity Case Management application is integrated to exchange data with PRÜM and EURODAC
systems, and can be extended for data exchange with other systems as well.
With the BIMS Identity Case Management application the customer acquires the ability to use:
•	 Person case biographical search.
•	 Person case biometrical identification.
•	 Person case viewing.
•	 Person case editing.
•	 Biometric data conflict situation processing.
•	 Not-processed person case selection, and hanging for viewing and processing.
•	 Incomplete biographical data processing.
•	 Person case comparison.
•	 Person case deletion request approval.
•	 Approval of person case biometric element deletion.
•	 Person case biographical information change history.
•	 Person case change history (attribute data changes).
•	 Person biometrical identification request processing and cooperation with external systems.
Identity Case Management application is mainly used by organizations with a Central Biometric Systems
which collects and processes biometric data.
It is used to solve identity conflicts and manage biometric and biographical identities. The application
can interact with biometric expert software – such as BIMS Finger and Face Expert applications.
BIMS MOBILE ID
BIMS Mobile ID is used as an application on mobile devices (smart phones or special mobile devices) to
perform real time and any place person basic identification or verification processes using finger print
and face image. Therefore the application can be widely used by different law enforcement organizations,
for example, police officers, in order to establish arrested person’s identity at the crime scene or in
the medicine and ambulance work, for example, to identify unconscious person’s identity or to identify
unknown corpse during the medical expertise at the crime scene. In addition the application provides
the ability to store wanted person list locally on the device with options of synchronisation to central
system which allows to identify/verify person in an offline mode.
The special mobile devices contain multiple compactly combined equipment for biometric data – scanner
for fingerprints, camera for face images and a slot for reading smart cards. The Android interface is
known to large part of users, but the mobile internet connection brings the possibility to use the device
almost from any place possible. Additional features offer the full benefits of geolocation based provided
by built-in GPS, time stamping and other location services.
If needs for mobile identification solution requires more biometric modalities than fingerprints and face
recognition, we offer multimodal biometric recognition to the current set. BIMS Mobile ID can be used
at the scene of crime or for civil identification on the street or airport. This device includes fingerprints,
face image and iris recognition.
For police officers the device can be a great help when establishing arrested person’s identity. BIMS
Mobile ID allows enrolling, identifying and verifying a person by single slap fingerprint, rolled fingerprints
and dual fingerprints recognition.
This device can always be “on-person”, so border control employees can use the device to prevent
criminals leaving the country.
The benefits of mobile identification bring the users efficient person identification means independently
from location and time.
BIMS VERIFICATION AGAINST IDENTITY DOCUMENT
BIMS application for Verification against Identity Document provides the real time person identity check.
The application based on the biometrical document (passport, e-ID card) scans the person data and
compares it against the live biometric data acquired from person (using biometrical data scanner) who is
presenting the document. Current application can be widely used by different governmental institutions,
border control and customs (for example, at airport and e-gates), by banks and other organizations, in
order to efficiently check if person is legal document holder. As well application can be used in election
process to verify voter’s identity and eligibility to vote.
BIMS Verification against Identity Document application is presented in multiple forms based on different
customer needs:
•	 Desktop application – for government offices.
•	 Mobile application – for mobile devices to carry “on-person”.
•	 Stationary electronic gates on premises – for buildings and public events.
For mobile solution of Verification against Identity
Document BIMS already offers a product called BIMS
Mobile ID. It combines verification by multimodal biometric
data – fingerprints and face image, the same modalities
incorporated in most passports, international travel
documents and ID cards.
BIMS Verification against Identity Document could have a
significant impact on the election process if such solution
would be used. The voter’s identity is verified according to
the biometric information contained in the identity document
and his/her eligibility to participate in the elections is
checked in a centralized voters’ register.
Electronic gates or eGates are meant primarily for organizations providing border control but does
not end with that. Large corporations with high security needs also can use such identity verification
solutions for providing access to premises.
Features brought to the customer by acquiring such electronic gates solution:
•	 Consists of face recognition software and panel hardware and firmware.
•	 Modular, flexible design.
•	 Mobile unit moves into optimal vertical position based on face location in less than 2 seconds.
•	 Monitor shows live image of the person and displays user instructions.
•	 Proprietary sensor detects presentation attacks (masks, printed images, video material).
•	 Incorporates the latest face recognition algorithm developed by one of the world’s leading
biometric solutions experts – Cognitec.
•	 User-friendly interface for easy integration.
•	 Installs onto certified glass surfaces or can be ordered with glass cover.
Main benefit for applying such solutions is an efficient person’s identity document check against his/her
biometric information.
Additional benefit brings the customer the ability to check if the person verified is registered in the
wanted persons list. If so, an alert message is shown and required parties are notified.
BIMS VIDEO ANALYTICS
The BIMS Video Analytics application automatically scans incoming video streams, detects multiple
faces and checks for possible matches against centralized wanted persons watch list. If a match is
found, law enforcement organizations are notified in real time (using automatic alert system – email,
SMS) allowing them to focus on the identified wanted person. Therefore application can be widely used in
different public places (border control, airports, train stations, bus stations etc.) where video monitoring
is performed in order to check persons’ identities against central watch list.
The application detects people’s faces in live video streams or video footage and stores video sequences
of cropped faces (face streams) for each appearance in front of a camera.
The BIMS Video Analytics runs on Cognitec’s FaceVACS-VideoScan software which provides a few
very commercially significant features – people analytics, people flow and business intelligence. The
customer will be provided with:
•	 Anonymous demographical data for intelligent signage, marketing and operational decisions.
•	 Analysis of traffic patterns and times to change interior design, place advertising and plan staffing.
•	 Crowd detection and waiting/transit time management.
•	 Alerts to security staff and customer experience enhancement.
Features brought to the customer by acquiring such video analytics solution:
•	 Tracks multiple faces simultaneously.
•	 Compares faces against image galleries in real time.
•	 Displays real-time signals when user-defined events occur.
•	 Displays and exports statistics about people flow, visitor demographics, and client behaviour.
•	 Sends signals and statistics to mobile devices.
•	 Supports interactive enrolment from still image and live video stream.
•	 Includes integrator kit for video systems, including C++ API and web services API.
•	 Provides high scalability in terms of watch list size, number of video streams and number of
visible faces.
BIMS FACE EXPERT WORKSTATION
The BIMS Face Expert application’s aim is to solve complex crimes which requires next-generation
tools. Therefore the face expert workstation provides the face image and video material processing,
using different automated expertise tools in order to conduct analysis and image/video enhancement.
This is to perform better data comparison against central system, as well as to enrol processed and
improved data to database. For example, application can generate person face 3D model, based only on
one fragment of face.
The BIMS Face Expert Workstation is based on the Cognitec’s FaceVACS DBScan which instantly
compares facial images from various sources to large image databases, supporting the biometric
identification, comparison, and verification of persons.
Law enforcement professionals can identify individuals in crime scene photos, videos stills and sketches
by matching facial images against the agency’s mug shot repository. ID issuance agencies can compare
ID portraits to large image databases to prevent ID fraud or detect clerical errors.
BIMS Face Expert Workstation, mainly developed for desktop application, but nonetheless also can be
used with mobile devices (running on Android). The BIMS Mobile Face Examiner offers the features to:
•	 use cameras in mobile devices to take suspect photos at the scene;
•	 search central databases and instantly receive candidate lists;
•	 view person demographics and other related information;
•	 use intuitive user interface;
•	 use flexible display options for candidate lists and data.
Features brought to the customer by acquiring such face expert workstation solution:
•	 Powerful toolset for image quality enhancement and visual inspection of matches.
•	 Cluster configurations for multi-million person database processing.
•	 Flexible and comfortable match list handling that allows sorting, rearranging, browsing, filtering
and more.
•	 Batch and interactive enrolments and identifications.
•	 Flexible management of additional case-related data.
•	 Integrator kit for easy integration into existing systems.
•	 Pre-binning by bin sets.
•	 One-to-few requests.
•	 High availability option.
BIMS FINGER EXPERT WORKSTATION
The BIMS Finger Expert Workstation application’s aim is to solve complex crimes, which requires next-
generation tools. Therefore the finger expert workstations provides the latent print material processing,
using different automated expertise tools, in order to conduct analysis and image enhancement. This is
to perform better data comparison against central system, as well as to enrol processed and improved
data to database.
BIMS Finger Expert Workstation uses the functionality of fingerprint identification (dactyloscopy) and
the corresponding biometric application (AFIS) is sanctioned by legal systems throughout the world.
Therefore, the Criminal AFIS can be applied to convict criminals solely based on identified fingerprints
found at a crime scene.
Features brought to the customer by acquiring such finger expert workstation solution:
•	 State of the art Card Scan Application for conversion of fingerprint slips/cards as well as palm
prints from paper.
•	 Live Scan Application for capture of finger- and palm prints, photo and signature.
•	 Automatic Image Processing for quality control of the captured prints.
•	 Forensic Workstation for editing and visual enhancement of latent finger and palm prints.
•	 Verification Application for managing biometric and demographic data with easy to handle
candidate list.
•	 Crime History/Case Management.
•	 Reporting and Statistics.
•	 Print Application (e.g. Certificate of Good Conduct).
The BIMS Finger Expert Workstation can be used by different law enforcement institutions – central
police and regional police forces, prisons, and special security forces.
•	 Police database with tenprints (TP) and latent prints (LP).
•	 Includes TP-TP, TP-LP, LP-TP, LP-LP searching.
•	 World’s fastest AFIS coding and matching.
•	 High-performance pre-filtration, adjustable using sample specimen.
•	 Best performance in recognition rates.
•	 No special hardware necessary, as commercially available standard hardware is used.
•	 Runs on all hardware platforms and common operating systems such as Windows and/or Unix.
•	 Use of standard databases, such as Oracle, SQL Server, Informix, etc.
•	 The customer has full authority over his own database – no access or data transfer to the AFIS is
needed during remote maintenance.
•	 Coding and matching of:
o epidermal ridges
o forks
o pattern centers
o deltas
•	 Integration of digital photos and signatures.
BIMS SYSTEM ADMINISTRATION
BIMS System Administration is a tool for an efficient control and monitoring of the central system
settings and configuration. Current application has a simple and user-friendly web interface, which
enables system administrators to easily conduct and provide a system maintenance and support.
The main application functionality allows to view and configure audit data, configuration parameters,
system’s scheduled jobs and background tasks. As well the application allows to view and manage
wanted person watch lists, to modify automatic alert system, and to analyse current match and alert
activities. In addition the BIMS administration application provides a convenient view and analysis of
system errors and failures, as well as the functionality of cleaning for system data array with poor
quality information.
BIMS System Administration application is mainly for use in organizations, which are responsible for the
central system maintenance and administration.
•	 Main system administrator – changes system parameters and system’s scheduled task
configuration, monitors system (audit events, error log).
•	 System administrator – monitors system (audit events, error log).
•	 Poor quality biometrical data manager – manages poor quality biometrical data (cleans old and
not needed poor quality biometrics).
BIMS CORE BUSINESS SYSTEMS
The core business system of BIMS offers multimodal biometric services, starting from biometric search
engine to administration and reporting systems.
Data exchange is ensured with several external systems:
•	 EURODAC
•	 PRÜM
•	 ECRIS
•	 State internal systems (as the Ministry of Interior of the Republic of Latvia)
Data exchange is standardized as the systems use NIST files for data transfers between each other.
NIST file contains all necessary person case data, including the biometric information of any enrolled
modality – all information contained in a secure form.
Reporting and monitoring services are integrated with Zabbix Solution which brings the customer
such benefits:
•	 Consolidated monitoring solution for all alarming and performance related information.
•	 Excellent flexibility and scalability and great stability.
•	 Alerting on “situations unique” to a “specific issue”.
•	 Very easy in implementation, use and customization.
•	 Easy to configure and update due to many existing resources explaining how or where to tune or
fix problems.
•	 Easily monitors any type of vendor or device.
•	 Custom graphs, the maps feature, and latest data.
•	 Included functionality is sufficient to monitor almost any server and network device.
•	 Ability to fix problems before the customer even becomes aware of their existence.
•	 Extensive information for decision making in solving problems or bottlenecks in the networks.
•	 Possibility to automate the processes.
•	 Low administrative costs.
•	 Increase company’s ROI.
International standards supported:
•	 BioAPI 2.0 (ISO/IEC 19784-1:2006) (Framework and Biometric Service Provider for fingerprint
identification engine)
•	 ISO/IEC 19794-2:2005 (Fingerprint Minutiae Data)
•	 ISO/IEC 19794-4:2005 (Finger Image Data)
•	 ANSI/INCITS 378-2004 (Finger Minutiae Format for Data Interchange)
•	 ANSI/INCITS 381-2004 (Finger Image-Based Data Interchange Format)
•	 ANSI/NIST-CSL 1-1993 (Data Format for the Interchange of Fingerprint, Facial, & SMT Information)
•	 ANSI/NIST-ITL1a-1997(DataFormatfortheInterchangeofFingerprint,Facial,&SMTInformation)
•	 ANSI/NIST-ITL 1-2000 (Data Format for the Interchange of Fingerprint, Facial, & SMT Information)
•	 ANSI/NIST-ITL 1-2007 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric
Information)
•	 ANSI/NIST-ITL 1a-2009 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric
Information)
•	 ANSI/NIST-ITL 1-2011 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric
Information)
•	 BioAPI 2.0 (ISO/IEC 19784-1:2006) (Framework and Biometric Service Provider for Face
Identification Engine)
•	 ISO/IEC 19794-5:2005 (Face Image Data)
•	 ANSI/INCITS 385-2004 (Face Recognition Format for Data Interchange)
•	 BioAPI2.0(ISO/IEC19784-1:2006)(FrameworkandBiometricServiceProviderforirisidentification
engine)
•	 ISO/IEC 19794-6:2005 (Iris Image Data)
•	 ANSI/INCITS 379-2004 (Iris Image Interchange Format)
•	 EBTS (Electronic Biometric Transmission Specification)
BIMS BIOMETRIC DATA MIGRATION
DPA has performed multiple biometric data migrations for government institutions from their registers  –
civil registry, registry of Road Traffic Safety Directorate, police biometric registers (face records, criminal
AFIS), etc.
The automated fingerprint information system (AFIS) has been migrated while other processes evaluated
the person files, compared them and determined the duplicates – a process that cleaned the information
system from unnecessary data.
The experience gained from such projects gave the knowledge and understanding of biometric
databases and the correlation between identities and the biometric data quality describing the biometric
themselves.
BIMS Migration tools offer migrating paper based fingerprints (dactylocards) to digital form. By scanning
the dactylocards with a fast scanning station can provide large printed sheet information to automated
fingerprint information systems. Such printed sheet fast scanning station:
•	 Can scan up to 500 fingerprints per hour.
•	 Checks print data quality in real time.
•	 Returns high resolution images: 500 or 1000 dpi.
BIMS AUTOMATED DOCUMENT ISSUANCE
The BIMS Automated Document Issuance is a solution for civil biometric data enrollment for the purpose
of renewing an electronic ID (eID), biometric passport, driver’s licence or any other type of document
containing biometric data. Solution uses communication with the Central Biometric System.
A traditional card issuance model is when a citizen enrolls his/her data into a system, then an official
validates the person and submits a request for a document production. After the document is produced,
it is sent handed to the citizen at the office or sent by mail. After that the citizen activates the document,
if necessary. This model poses risk of lost or stolen document in the delivery phase.
The traditional model is optimized by adding self-service kiosks and document dispensers. The BIMS
Automated Document Issuance solution offers a multimodal biometric enrollment and verification in
one application. The citizen can specify a phone number and/or e-mail address which will be used to
notify the citizen about the status of the document and the location of the nearest document dispenser
where the documents is sent.
•	 The user can enroll most popular biometric modalities supported in biometric passports and
other documents – fingerprints, face and iris.
•	 In a secure link the validated biometric and biographic information is sent to the production
facility.
•	 Once produced, the cards are placed in a secure cartridges, ready for distribution.
•	 The citizen, after being notified, retrieves the card in a previously specified document dispenser
located in most convenient locations.
Benefits brought to the customer by acquiring such automated civil document issuance solution:
•	 Improve waiting and processing times.
•	 Reduce biometric data inconsistency and unconformity  (pose, face expression, and others).
•	 Eliminate problems with the integration of components from different providers.
•	 Reduce errors caused by manual procedures.
•	 Improve the robustness of existing solutions for public places.
•	 Reduce the environment impact on performance and quality.
•	 Easier to use by citizens and operators.
•	 Improve the capacity of the document delivery process.
•	 Enhance security and efficiency in the document distribution chain.
•	 Self-service and automated document delivery solution.
•	 Biometric enrollment and document delivery integrated in a single unit
•	 Reduce waiting times per citizen to obtain a document.
A solution that targets people without any specific IT knowledge.
BIMS BENEFITS
With BIMS our customer gains biometric information system that can be integrated fast and adapted
for the individual needs and requirements of the client. Every component of the system provides top
performance guaranteeing solid results with great support when struggling to achieve the desirable
results.
BIMS Biometric Data Acquisition application is manufacturer independent unified platform using
multimodal biometrics allowing using more than one means of identification, thus providing that your
system can retain a high threshold recognition setting and you can adjust biometric quality thresholds
for your individual security level needs.
The cleanness of the biometric system is ensured by the BIMS Identity Case Management application
because it minimizes the count of conflicting person cases. Every person case is cross checked to detect
if any person case element is unique.
The BIMS Mobile ID solutions offer the user freedom of movement as the portable and compact devices
can be used almost anywhere.
The BIMS Verification against Identity Document gives its users certainty of whether the document
holder is the rightful owner of particular document.
The BIMS Video Analytics enable the business owners and security providers a powerful tool to
enhancing customer experience and their safety.
The BIMS Face Expert Workstation offers the police departments and other criminal investigation
offices a powerful tool to analysing face of criminals caught “on tape”, creating a searchable face model
and matching it in the database.
The BIMS Finger Expert Workstations also provides possibility to find criminals whose fingerprints
have been found in the scene of crime.
All components together or as an individual solution offers the benefits of customization, reducing
costs and increasing efficiency.
Sources used:
CredenceID	www.credenceid.com
VisionBox 	 www.vision-box.com
Cognitec 		 www.cognitec.com

Mais conteúdo relacionado

Mais procurados

Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form FillingIRJET Journal
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsManzurul Hassan Zumman
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAA STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAsipij
 

Mais procurados (20)

Hp pultik 1000x1000_out_en
Hp pultik 1000x1000_out_enHp pultik 1000x1000_out_en
Hp pultik 1000x1000_out_en
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Ppt1
Ppt1Ppt1
Ppt1
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Cover page
Cover pageCover page
Cover page
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
D0351022026
D0351022026D0351022026
D0351022026
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAA STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
 

Destaque

Safe handling fruit and veggies
Safe handling fruit and veggiesSafe handling fruit and veggies
Safe handling fruit and veggiesRachael Mann
 
Dlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacjiDlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacjiannatrawka
 
SA Entrum
SA EntrumSA Entrum
SA Entrumpesec
 
הראיות לפסיכולוגיה מונחית ראיות
הראיות לפסיכולוגיה מונחית ראיותהראיות לפסיכולוגיה מונחית ראיות
הראיות לפסיכולוגיה מונחית ראיותTsviGil
 
Servicii de audit in Romania
Servicii de audit in RomaniaServicii de audit in Romania
Servicii de audit in RomaniaBridgeWest.eu
 
סילבוס אומנות השכנוע הטבעית
סילבוס אומנות השכנוע הטבעיתסילבוס אומנות השכנוע הטבעית
סילבוס אומנות השכנוע הטבעיתStas Segin
 
Cisco press ccnp route 642 902
Cisco press ccnp route 642 902Cisco press ccnp route 642 902
Cisco press ccnp route 642 902Yashwant Aditya
 
xCode presentation
xCode presentationxCode presentation
xCode presentationSimon Zhou
 
Eurosha kenya pres_osm_en_20121031
Eurosha kenya pres_osm_en_20121031Eurosha kenya pres_osm_en_20121031
Eurosha kenya pres_osm_en_20121031Severin Menard
 
Intro to Performance Based Assessments
Intro to Performance Based AssessmentsIntro to Performance Based Assessments
Intro to Performance Based AssessmentsRachael Mann
 
Department for Education Fellowship Application
Department for Education Fellowship ApplicationDepartment for Education Fellowship Application
Department for Education Fellowship ApplicationKevin P. Hudson
 
регистрация фирмы в Португалии
регистрация фирмы в Португалиирегистрация фирмы в Португалии
регистрация фирмы в ПортугалииBridgeWest.eu
 
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300Dyplast Products
 
Projektisivun pohja-malli 13 3-13 a-ryhma
Projektisivun pohja-malli 13 3-13 a-ryhmaProjektisivun pohja-malli 13 3-13 a-ryhma
Projektisivun pohja-malli 13 3-13 a-ryhmalansisuomenhelmet
 
connpass design at BPStudy #88
connpass design at BPStudy #88connpass design at BPStudy #88
connpass design at BPStudy #88Yumi uniq Ishizaki
 

Destaque (17)

05 e
05 e05 e
05 e
 
Safe handling fruit and veggies
Safe handling fruit and veggiesSafe handling fruit and veggies
Safe handling fruit and veggies
 
Dlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacjiDlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacji
 
SA Entrum
SA EntrumSA Entrum
SA Entrum
 
הראיות לפסיכולוגיה מונחית ראיות
הראיות לפסיכולוגיה מונחית ראיותהראיות לפסיכולוגיה מונחית ראיות
הראיות לפסיכולוגיה מונחית ראיות
 
Servicii de audit in Romania
Servicii de audit in RomaniaServicii de audit in Romania
Servicii de audit in Romania
 
סילבוס אומנות השכנוע הטבעית
סילבוס אומנות השכנוע הטבעיתסילבוס אומנות השכנוע הטבעית
סילבוס אומנות השכנוע הטבעית
 
Cisco press ccnp route 642 902
Cisco press ccnp route 642 902Cisco press ccnp route 642 902
Cisco press ccnp route 642 902
 
xCode presentation
xCode presentationxCode presentation
xCode presentation
 
Eurosha kenya pres_osm_en_20121031
Eurosha kenya pres_osm_en_20121031Eurosha kenya pres_osm_en_20121031
Eurosha kenya pres_osm_en_20121031
 
Intro to Performance Based Assessments
Intro to Performance Based AssessmentsIntro to Performance Based Assessments
Intro to Performance Based Assessments
 
Department for Education Fellowship Application
Department for Education Fellowship ApplicationDepartment for Education Fellowship Application
Department for Education Fellowship Application
 
Eu future tense
Eu future tenseEu future tense
Eu future tense
 
регистрация фирмы в Португалии
регистрация фирмы в Португалиирегистрация фирмы в Португалии
регистрация фирмы в Португалии
 
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300
Customer Bulletin 0410 A Comparison of ISO-C1 and HT-300
 
Projektisivun pohja-malli 13 3-13 a-ryhma
Projektisivun pohja-malli 13 3-13 a-ryhmaProjektisivun pohja-malli 13 3-13 a-ryhma
Projektisivun pohja-malli 13 3-13 a-ryhma
 
connpass design at BPStudy #88
connpass design at BPStudy #88connpass design at BPStudy #88
connpass design at BPStudy #88
 

Semelhante a Dpa bims 2015_eng

Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...
Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...
Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...Star Link Communication Pvt Ltd
 
Biometrics
BiometricsBiometrics
BiometricsN/A
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfBahaa Abdulhadi
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
Linas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Bahaa Abdulhadi
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometricsnishiyath
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochureColin Valencia
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBahaa Abdulhadi
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 

Semelhante a Dpa bims 2015_eng (20)

Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...
Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...
Unveiling the Future: Biometric Face Recognition Systems Revolutionizing Secu...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdf
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Linas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometrics
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdf
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
mims_en-5_0
mims_en-5_0mims_en-5_0
mims_en-5_0
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 

Mais de madaravinberga

Mais de madaravinberga (7)

Rix dc pmlp_2014
Rix dc pmlp_2014Rix dc pmlp_2014
Rix dc pmlp_2014
 
Lv digital culture_rix_dc
Lv digital culture_rix_dcLv digital culture_rix_dc
Lv digital culture_rix_dc
 
Dpa acto 2015_eng
Dpa acto 2015_engDpa acto 2015_eng
Dpa acto 2015_eng
 
Dpa postolo 2015_eng
Dpa postolo 2015_engDpa postolo 2015_eng
Dpa postolo 2015_eng
 
Dpa fits 2015_eng
Dpa fits 2015_engDpa fits 2015_eng
Dpa fits 2015_eng
 
E police gara prezentacija en
E police gara prezentacija enE police gara prezentacija en
E police gara prezentacija en
 
Degvielas kvalitate
Degvielas kvalitateDegvielas kvalitate
Degvielas kvalitate
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Dpa bims 2015_eng

  • 2.
  • 3. BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons’ biographical and biometrical data collection in real time or from existing file (pictures, ten print cards etc.) and transmission to Central Biometric System, with persons’ verification and identification functionality. Application provides unified and intuitive user interface, in order to quickly and easily collect biographical and biometrical data to person case, and send it to central system. Biometric data enrollment, identification and verification does not bring the best impact if the quality of the captured data is not assessed right. Therefore BIMS Biometric Data Acquisition application conducts automatic quality assessment and control in real-time of obtained biometrical elements, as well as performs duplicate and elements consistency check, and obtained biometrical data segmentation. • The BIMS application can be used by any authorized organization to perform biometrical data collection, as well as to identify or verify person. • Mostly current application is being used by police stations to register new criminals and collect their biometrical data. • The application is very useful for document issuing organizations, to collect civil person’s data.
  • 4. The main application advantage is that it is not dependent from any specific hardware manufacturer for biometrical data collection, or biometrical algorithms providers, which allows to use and integrate application with different devices and algorithms. As well one of the application functions provides the ability to automatically add person to centralized wanted person list, or check it in background mode against this list, when the new biometrical data or person case is being enrolled to the system. The application encapsulates all of the person’s data and supported biometry data in a NIST 2011 file standardized by the ANSI/NIST organization. In addition application has the management functionality for the centralized wanted person list and automatic alert system. Therefore the provided functionality allows to add new person cases to the wanted person list, as well as to modify and delete current cases from the list. Also, its functionality provides the ability to control the automatic alert system, which sends out the notifications (e-mail, SMS) to different law enforcement organizations or person’s about the possible matches, in order to allow them to focus on the identified wanted person. Benefits of the BIMS Biometric Data Acquisition application: • Unified platform for multiple biometric modalities; • Not dependent from any specific hardware manufacturers or biometrical algorithms providers; • Adjustable biometric quality thresholds for many needs; • Biometric data transmission files standardized by the ANSI/NIST organization for a secured data transfer; • Watchlist feature for centralized wanted people list management functionality; • Automatic alerting system by e-mail or SMS when a wanted person is detected.
  • 5. BIMS IDENTITY CASE MANAGEMENT APPLICATION BIMS Identity Case Management application is centralized control and monitoring tool of all biometrical identities collected and stored in Central Biometric System. The main functionality of it allows to resolve different biometrical and biographical conflicts, to search and compare person cases, and also to modify and delete person cases. As well the current application automatically saves and stores history of each person case changes, which enables to see how, when and by whom the person case has been modified. In addition the BIMS Identity Case Management application provides cooperation and data exchange with experts which allows, for example, to send two person cases for comparison to biometrical data expert, and to receive expert conclusion about the similarity of both cases. Also the BIMS application provides person identification in Central Biometric System and other external systems. For example, the Identity Case Management application is integrated to exchange data with PRÜM and EURODAC systems, and can be extended for data exchange with other systems as well. With the BIMS Identity Case Management application the customer acquires the ability to use: • Person case biographical search. • Person case biometrical identification. • Person case viewing. • Person case editing. • Biometric data conflict situation processing. • Not-processed person case selection, and hanging for viewing and processing. • Incomplete biographical data processing. • Person case comparison. • Person case deletion request approval. • Approval of person case biometric element deletion. • Person case biographical information change history. • Person case change history (attribute data changes). • Person biometrical identification request processing and cooperation with external systems.
  • 6. Identity Case Management application is mainly used by organizations with a Central Biometric Systems which collects and processes biometric data. It is used to solve identity conflicts and manage biometric and biographical identities. The application can interact with biometric expert software – such as BIMS Finger and Face Expert applications.
  • 7. BIMS MOBILE ID BIMS Mobile ID is used as an application on mobile devices (smart phones or special mobile devices) to perform real time and any place person basic identification or verification processes using finger print and face image. Therefore the application can be widely used by different law enforcement organizations, for example, police officers, in order to establish arrested person’s identity at the crime scene or in the medicine and ambulance work, for example, to identify unconscious person’s identity or to identify unknown corpse during the medical expertise at the crime scene. In addition the application provides the ability to store wanted person list locally on the device with options of synchronisation to central system which allows to identify/verify person in an offline mode. The special mobile devices contain multiple compactly combined equipment for biometric data – scanner for fingerprints, camera for face images and a slot for reading smart cards. The Android interface is known to large part of users, but the mobile internet connection brings the possibility to use the device almost from any place possible. Additional features offer the full benefits of geolocation based provided by built-in GPS, time stamping and other location services. If needs for mobile identification solution requires more biometric modalities than fingerprints and face recognition, we offer multimodal biometric recognition to the current set. BIMS Mobile ID can be used at the scene of crime or for civil identification on the street or airport. This device includes fingerprints, face image and iris recognition. For police officers the device can be a great help when establishing arrested person’s identity. BIMS Mobile ID allows enrolling, identifying and verifying a person by single slap fingerprint, rolled fingerprints and dual fingerprints recognition. This device can always be “on-person”, so border control employees can use the device to prevent criminals leaving the country. The benefits of mobile identification bring the users efficient person identification means independently from location and time.
  • 8. BIMS VERIFICATION AGAINST IDENTITY DOCUMENT BIMS application for Verification against Identity Document provides the real time person identity check. The application based on the biometrical document (passport, e-ID card) scans the person data and compares it against the live biometric data acquired from person (using biometrical data scanner) who is presenting the document. Current application can be widely used by different governmental institutions, border control and customs (for example, at airport and e-gates), by banks and other organizations, in order to efficiently check if person is legal document holder. As well application can be used in election process to verify voter’s identity and eligibility to vote. BIMS Verification against Identity Document application is presented in multiple forms based on different customer needs: • Desktop application – for government offices. • Mobile application – for mobile devices to carry “on-person”. • Stationary electronic gates on premises – for buildings and public events. For mobile solution of Verification against Identity Document BIMS already offers a product called BIMS Mobile ID. It combines verification by multimodal biometric data – fingerprints and face image, the same modalities incorporated in most passports, international travel documents and ID cards. BIMS Verification against Identity Document could have a significant impact on the election process if such solution would be used. The voter’s identity is verified according to the biometric information contained in the identity document and his/her eligibility to participate in the elections is checked in a centralized voters’ register.
  • 9. Electronic gates or eGates are meant primarily for organizations providing border control but does not end with that. Large corporations with high security needs also can use such identity verification solutions for providing access to premises. Features brought to the customer by acquiring such electronic gates solution: • Consists of face recognition software and panel hardware and firmware. • Modular, flexible design. • Mobile unit moves into optimal vertical position based on face location in less than 2 seconds. • Monitor shows live image of the person and displays user instructions. • Proprietary sensor detects presentation attacks (masks, printed images, video material). • Incorporates the latest face recognition algorithm developed by one of the world’s leading biometric solutions experts – Cognitec. • User-friendly interface for easy integration. • Installs onto certified glass surfaces or can be ordered with glass cover. Main benefit for applying such solutions is an efficient person’s identity document check against his/her biometric information. Additional benefit brings the customer the ability to check if the person verified is registered in the wanted persons list. If so, an alert message is shown and required parties are notified.
  • 10. BIMS VIDEO ANALYTICS The BIMS Video Analytics application automatically scans incoming video streams, detects multiple faces and checks for possible matches against centralized wanted persons watch list. If a match is found, law enforcement organizations are notified in real time (using automatic alert system – email, SMS) allowing them to focus on the identified wanted person. Therefore application can be widely used in different public places (border control, airports, train stations, bus stations etc.) where video monitoring is performed in order to check persons’ identities against central watch list. The application detects people’s faces in live video streams or video footage and stores video sequences of cropped faces (face streams) for each appearance in front of a camera.
  • 11. The BIMS Video Analytics runs on Cognitec’s FaceVACS-VideoScan software which provides a few very commercially significant features – people analytics, people flow and business intelligence. The customer will be provided with: • Anonymous demographical data for intelligent signage, marketing and operational decisions. • Analysis of traffic patterns and times to change interior design, place advertising and plan staffing. • Crowd detection and waiting/transit time management. • Alerts to security staff and customer experience enhancement. Features brought to the customer by acquiring such video analytics solution: • Tracks multiple faces simultaneously. • Compares faces against image galleries in real time. • Displays real-time signals when user-defined events occur. • Displays and exports statistics about people flow, visitor demographics, and client behaviour. • Sends signals and statistics to mobile devices. • Supports interactive enrolment from still image and live video stream. • Includes integrator kit for video systems, including C++ API and web services API. • Provides high scalability in terms of watch list size, number of video streams and number of visible faces.
  • 12. BIMS FACE EXPERT WORKSTATION The BIMS Face Expert application’s aim is to solve complex crimes which requires next-generation tools. Therefore the face expert workstation provides the face image and video material processing, using different automated expertise tools in order to conduct analysis and image/video enhancement. This is to perform better data comparison against central system, as well as to enrol processed and improved data to database. For example, application can generate person face 3D model, based only on one fragment of face. The BIMS Face Expert Workstation is based on the Cognitec’s FaceVACS DBScan which instantly compares facial images from various sources to large image databases, supporting the biometric identification, comparison, and verification of persons.
  • 13. Law enforcement professionals can identify individuals in crime scene photos, videos stills and sketches by matching facial images against the agency’s mug shot repository. ID issuance agencies can compare ID portraits to large image databases to prevent ID fraud or detect clerical errors. BIMS Face Expert Workstation, mainly developed for desktop application, but nonetheless also can be used with mobile devices (running on Android). The BIMS Mobile Face Examiner offers the features to: • use cameras in mobile devices to take suspect photos at the scene; • search central databases and instantly receive candidate lists; • view person demographics and other related information; • use intuitive user interface; • use flexible display options for candidate lists and data. Features brought to the customer by acquiring such face expert workstation solution: • Powerful toolset for image quality enhancement and visual inspection of matches. • Cluster configurations for multi-million person database processing. • Flexible and comfortable match list handling that allows sorting, rearranging, browsing, filtering and more. • Batch and interactive enrolments and identifications. • Flexible management of additional case-related data. • Integrator kit for easy integration into existing systems. • Pre-binning by bin sets. • One-to-few requests. • High availability option.
  • 14. BIMS FINGER EXPERT WORKSTATION The BIMS Finger Expert Workstation application’s aim is to solve complex crimes, which requires next- generation tools. Therefore the finger expert workstations provides the latent print material processing, using different automated expertise tools, in order to conduct analysis and image enhancement. This is to perform better data comparison against central system, as well as to enrol processed and improved data to database. BIMS Finger Expert Workstation uses the functionality of fingerprint identification (dactyloscopy) and the corresponding biometric application (AFIS) is sanctioned by legal systems throughout the world. Therefore, the Criminal AFIS can be applied to convict criminals solely based on identified fingerprints found at a crime scene. Features brought to the customer by acquiring such finger expert workstation solution: • State of the art Card Scan Application for conversion of fingerprint slips/cards as well as palm prints from paper. • Live Scan Application for capture of finger- and palm prints, photo and signature. • Automatic Image Processing for quality control of the captured prints. • Forensic Workstation for editing and visual enhancement of latent finger and palm prints. • Verification Application for managing biometric and demographic data with easy to handle candidate list. • Crime History/Case Management. • Reporting and Statistics. • Print Application (e.g. Certificate of Good Conduct).
  • 15. The BIMS Finger Expert Workstation can be used by different law enforcement institutions – central police and regional police forces, prisons, and special security forces. • Police database with tenprints (TP) and latent prints (LP). • Includes TP-TP, TP-LP, LP-TP, LP-LP searching. • World’s fastest AFIS coding and matching. • High-performance pre-filtration, adjustable using sample specimen. • Best performance in recognition rates. • No special hardware necessary, as commercially available standard hardware is used. • Runs on all hardware platforms and common operating systems such as Windows and/or Unix. • Use of standard databases, such as Oracle, SQL Server, Informix, etc. • The customer has full authority over his own database – no access or data transfer to the AFIS is needed during remote maintenance. • Coding and matching of: o epidermal ridges o forks o pattern centers o deltas • Integration of digital photos and signatures.
  • 16. BIMS SYSTEM ADMINISTRATION BIMS System Administration is a tool for an efficient control and monitoring of the central system settings and configuration. Current application has a simple and user-friendly web interface, which enables system administrators to easily conduct and provide a system maintenance and support. The main application functionality allows to view and configure audit data, configuration parameters, system’s scheduled jobs and background tasks. As well the application allows to view and manage wanted person watch lists, to modify automatic alert system, and to analyse current match and alert activities. In addition the BIMS administration application provides a convenient view and analysis of system errors and failures, as well as the functionality of cleaning for system data array with poor quality information. BIMS System Administration application is mainly for use in organizations, which are responsible for the central system maintenance and administration. • Main system administrator – changes system parameters and system’s scheduled task configuration, monitors system (audit events, error log). • System administrator – monitors system (audit events, error log). • Poor quality biometrical data manager – manages poor quality biometrical data (cleans old and not needed poor quality biometrics).
  • 17. BIMS CORE BUSINESS SYSTEMS The core business system of BIMS offers multimodal biometric services, starting from biometric search engine to administration and reporting systems. Data exchange is ensured with several external systems: • EURODAC • PRÜM • ECRIS • State internal systems (as the Ministry of Interior of the Republic of Latvia) Data exchange is standardized as the systems use NIST files for data transfers between each other. NIST file contains all necessary person case data, including the biometric information of any enrolled modality – all information contained in a secure form.
  • 18. Reporting and monitoring services are integrated with Zabbix Solution which brings the customer such benefits: • Consolidated monitoring solution for all alarming and performance related information. • Excellent flexibility and scalability and great stability. • Alerting on “situations unique” to a “specific issue”. • Very easy in implementation, use and customization. • Easy to configure and update due to many existing resources explaining how or where to tune or fix problems. • Easily monitors any type of vendor or device. • Custom graphs, the maps feature, and latest data. • Included functionality is sufficient to monitor almost any server and network device. • Ability to fix problems before the customer even becomes aware of their existence. • Extensive information for decision making in solving problems or bottlenecks in the networks. • Possibility to automate the processes. • Low administrative costs. • Increase company’s ROI. International standards supported: • BioAPI 2.0 (ISO/IEC 19784-1:2006) (Framework and Biometric Service Provider for fingerprint identification engine) • ISO/IEC 19794-2:2005 (Fingerprint Minutiae Data) • ISO/IEC 19794-4:2005 (Finger Image Data) • ANSI/INCITS 378-2004 (Finger Minutiae Format for Data Interchange) • ANSI/INCITS 381-2004 (Finger Image-Based Data Interchange Format) • ANSI/NIST-CSL 1-1993 (Data Format for the Interchange of Fingerprint, Facial, & SMT Information) • ANSI/NIST-ITL1a-1997(DataFormatfortheInterchangeofFingerprint,Facial,&SMTInformation) • ANSI/NIST-ITL 1-2000 (Data Format for the Interchange of Fingerprint, Facial, & SMT Information) • ANSI/NIST-ITL 1-2007 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric Information) • ANSI/NIST-ITL 1a-2009 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric Information) • ANSI/NIST-ITL 1-2011 (Data Format for the Interchange of Fingerprint, Facial, & Other Biometric Information) • BioAPI 2.0 (ISO/IEC 19784-1:2006) (Framework and Biometric Service Provider for Face Identification Engine) • ISO/IEC 19794-5:2005 (Face Image Data) • ANSI/INCITS 385-2004 (Face Recognition Format for Data Interchange) • BioAPI2.0(ISO/IEC19784-1:2006)(FrameworkandBiometricServiceProviderforirisidentification engine) • ISO/IEC 19794-6:2005 (Iris Image Data) • ANSI/INCITS 379-2004 (Iris Image Interchange Format) • EBTS (Electronic Biometric Transmission Specification)
  • 19. BIMS BIOMETRIC DATA MIGRATION DPA has performed multiple biometric data migrations for government institutions from their registers  – civil registry, registry of Road Traffic Safety Directorate, police biometric registers (face records, criminal AFIS), etc. The automated fingerprint information system (AFIS) has been migrated while other processes evaluated the person files, compared them and determined the duplicates – a process that cleaned the information system from unnecessary data. The experience gained from such projects gave the knowledge and understanding of biometric databases and the correlation between identities and the biometric data quality describing the biometric themselves. BIMS Migration tools offer migrating paper based fingerprints (dactylocards) to digital form. By scanning the dactylocards with a fast scanning station can provide large printed sheet information to automated fingerprint information systems. Such printed sheet fast scanning station: • Can scan up to 500 fingerprints per hour. • Checks print data quality in real time. • Returns high resolution images: 500 or 1000 dpi.
  • 20. BIMS AUTOMATED DOCUMENT ISSUANCE The BIMS Automated Document Issuance is a solution for civil biometric data enrollment for the purpose of renewing an electronic ID (eID), biometric passport, driver’s licence or any other type of document containing biometric data. Solution uses communication with the Central Biometric System. A traditional card issuance model is when a citizen enrolls his/her data into a system, then an official validates the person and submits a request for a document production. After the document is produced, it is sent handed to the citizen at the office or sent by mail. After that the citizen activates the document, if necessary. This model poses risk of lost or stolen document in the delivery phase. The traditional model is optimized by adding self-service kiosks and document dispensers. The BIMS Automated Document Issuance solution offers a multimodal biometric enrollment and verification in one application. The citizen can specify a phone number and/or e-mail address which will be used to notify the citizen about the status of the document and the location of the nearest document dispenser where the documents is sent. • The user can enroll most popular biometric modalities supported in biometric passports and other documents – fingerprints, face and iris. • In a secure link the validated biometric and biographic information is sent to the production facility. • Once produced, the cards are placed in a secure cartridges, ready for distribution. • The citizen, after being notified, retrieves the card in a previously specified document dispenser located in most convenient locations.
  • 21. Benefits brought to the customer by acquiring such automated civil document issuance solution: • Improve waiting and processing times. • Reduce biometric data inconsistency and unconformity (pose, face expression, and others). • Eliminate problems with the integration of components from different providers. • Reduce errors caused by manual procedures. • Improve the robustness of existing solutions for public places. • Reduce the environment impact on performance and quality. • Easier to use by citizens and operators. • Improve the capacity of the document delivery process. • Enhance security and efficiency in the document distribution chain. • Self-service and automated document delivery solution. • Biometric enrollment and document delivery integrated in a single unit • Reduce waiting times per citizen to obtain a document. A solution that targets people without any specific IT knowledge.
  • 22. BIMS BENEFITS With BIMS our customer gains biometric information system that can be integrated fast and adapted for the individual needs and requirements of the client. Every component of the system provides top performance guaranteeing solid results with great support when struggling to achieve the desirable results. BIMS Biometric Data Acquisition application is manufacturer independent unified platform using multimodal biometrics allowing using more than one means of identification, thus providing that your system can retain a high threshold recognition setting and you can adjust biometric quality thresholds for your individual security level needs. The cleanness of the biometric system is ensured by the BIMS Identity Case Management application because it minimizes the count of conflicting person cases. Every person case is cross checked to detect if any person case element is unique. The BIMS Mobile ID solutions offer the user freedom of movement as the portable and compact devices can be used almost anywhere. The BIMS Verification against Identity Document gives its users certainty of whether the document holder is the rightful owner of particular document. The BIMS Video Analytics enable the business owners and security providers a powerful tool to enhancing customer experience and their safety. The BIMS Face Expert Workstation offers the police departments and other criminal investigation offices a powerful tool to analysing face of criminals caught “on tape”, creating a searchable face model and matching it in the database. The BIMS Finger Expert Workstations also provides possibility to find criminals whose fingerprints have been found in the scene of crime. All components together or as an individual solution offers the benefits of customization, reducing costs and increasing efficiency. Sources used: CredenceID www.credenceid.com VisionBox www.vision-box.com Cognitec www.cognitec.com