Transcript Slide 1

Biometrics = Proof of Identity?
consistently accurate,
continuously reliable,
completely compatible.
This information is strictly for use by Ideco and its Associates. Reproduction
and distribution is strictly prohibited. Copyright Ideco Group Ltd.
An Identity Crises?
Identity Trust Scale
Bank Accounts
Property
Vehicles
Marital
Status
Credit Accounts
Employment
CIPC
Qualification
Credentials
ID Validation
Identity
Certification
Biometric
Verification
Bridging the Identity Gap
Reactive
Tentative
Cards
PINs
Identity
Recognition
Response
Gap
Passwords
Definitive
Proactive
Building Identity Chains
142
2010/11/12
10:30
400
Application login: User authenticated succesfully.,
Internet Explorer\Connect to 192.168.2.250,
({8159E1B8-245E-4932-BB9B899C4A8079BC})
143
2010/11/12
10:31
204
Profile,Cache,v3,0ms
smitd
144
2010/11/12
10:31
405
Declare opened, Login,
(ClaWin01000000H_5)
smitd
smitd@PLAY
192.168.2.250
145
2010/11/12
10:31
401
Account add, Login,
({3ED482E5-7465-4656-8C3A-AC8165638791})
smitd
smitd@PLAY
192.168.2.250
146
2010/11/12
10:31
203
Profile,Save,16ms
smitd
203
Profile,Save,v4
smitd
400
Application login: User authenticated succesfully.,
\Login, ({3ED482E57465-4656-8C3A-AC8165638791})
When?
147
2010/11/12
10:31
148
2010/11/12
10:31
149
2010/11/12
10:31
What?
Who?
smitd
smitd@PLAY
192.168.2.250
192.168.2.250
192.168.2.250
Where?
192.168.2.250
smitd
smitd@PLAY
192.168.2.250
smitd
smitd@PLAY
192.168.2.250
Application login: User authenticated succesfully.,
\Login, ({3ED482E57465-4656-8C3A-AC8165638791})
400
Agenda
Biometric 101
Next generation applications
DHA & National Identity Solutions
Key success factors
An integrated approach
Chain of evidence
The Practice of Biometrics
Tongue
Biometric Technology Options
• International dependence on fingerprint for forensics
• ICAO – 3 approved technologies (Fingerprint, Face & Iris)
• SA Law only accepts Fingerprint, Face & Signature
• 10 fingers per person means high enrolment probability compared to other techniques
Technology Life Cycle
Technology Adoption
The practice of Biometrics
True minutia points
Unique features in a fingerprint pattern area
Ridge ends
Ridge
splits
Average 80 minutia per finger
True minutia points?
Working with Fingerprints
Moisture
Dirt
Treated
Injury
Foreign
object
Extracting True Minutia
Filtering process
Binarisation and
skeletonisation
Minutiae Comparison and Fusion
Enrolment template
Transaction template
Minutia Comparison and Fusion
Scale adaptation /
rotation
Different overlapping
False minutia or
missing minutia
Distorsion
Matching threshold configurable
Real World Scenarios
F1m
F2f
F3c
Identification vs Verification
Automated Fingerprint Identification System
Real-time classification, segmentation, feature extraction and quality
assurance
Comparison against some or all references in the enrolment
database, producing a comparison score for each transaction
Ensure one unique identity profile per customer
Back ground de-duplication process
Assist in the reduction of fraud and risk
Be able to positively identify a person
Valid digital signature
Full audit of identity trail
Interoperability between other entities
Integrity in database
Changes in the Market Place
Evolution of Identity Control
Changes in the Market Place
DHA SmartID & OFV
Online Fingerprint Verification
Live Demo
Advancement in Biometric Applications
Multi-functional
Terminals
PCs & IT
Asset &
infrastructure
Advancement in Biometric Equipment
GreenBox
Multifunction input device
Enables paperless transaction
Document process automation
Integrated FICA/RICA station
Fast system integration
Small desktop footprint
No storage of paper records
USB Powered
MobiCheck
Fully configurable
Multiple input fields / devices
Online ID checks against NCCI
Verification or identification
Records on secure cloud servers
Business rule driven
Identity based transactions
Secure online access to records
A world class Biometric Solution
World Leading Biometric Solutions
Compliancy
(FBI, NIST)
Interoperability
Accuracy
Security with
True Fake Finger
Detection – FFD
Capacity
Matching Speed
Failure to enrol
Ergonomic Design
Integration &
Multiple application
Local support
An Integrated Approach
Direct integration to business systems
Aligned with current business processes
AFIS functionality scalable to business
requirements
All development tools and integration support
Windows, Linux and Android support
Fully compliant to industry standards
Best in class at affordable pricing
Full maintenance and support program








A viable business case
Critical Success Factors
FTE, FAR, Speed, db Size
Image and / or Template
Protecting customer identities
Comply to International standards
Compatible to civil systems
Expert use in court of law
Clear growth path







Some risks to consider
Risk of false acceptance
± 20% false
minutia
added
Risk of non-compliance
Image
Capturing
Image
Filtering
Minutiae
Extraction
FBI IQS App. F&G
PIV (HSPD-12)
ISO 29794-4 Part1
ANSI 378 &
ISO19794-2
Biometric
Server
WSQ Gray-scale
image compression
ISO/IEC 19794-4
FIPS201 &
ISO/IEC 24745
Image Store
ISO/IEC 24787 for On-card biometric comparison”
Template Store
ISO
ANSI
Morpho
Risk of chromatic aberration
Risk of inferior algorithms
Failure to Enrol (FTE) <0.1%
False Acceptance Rate (FAR)
• - 10-2 to 10-8
• Breach of security
False Rejection Rate (FRR)
• Denial of access
Comfort and Security
– Low FRR = Comfort
– Low FAR = Security
– Morpho Default EER FAR = 0.01% & FRR = 1%
Risk of inferior optics
Extent of biometrics within SA
More than 75 000 terminals in South Africa, 2.5 million employees
primarily through a network of Certified Partners
SABS SC71Q – adoption of ISO/IEC standards
Market leader with certified repair centre
Major projects:
• Pensions & social grants (> 7 million records)
• SAPS (PCEM Forensics & Criminal booking stations)
• AFISwitch – (> 7 million records - exclusive 15 year license)
• IJS – 5000 PC’s Secure Login
• DoI (All Illegal Immigrants)
• DrLic (> 9 million records)
• HANIS (>32 million records)
• Certified repair centre
• NCCI (Integrated Identity Management)
@ your service
Thank you
Key Success Criteria
Benchmarking
Key Success Criteria
Benchmarking
Key Success Criteria
Benchmarking
Possible Architecture
User Interface
Layer
Transaction
Authorisation
Central Identity
Repository
GSM
Mobile
A/C & TA
Verification
Enrolment
Typical take on device
Image and template extraction
Template loaded on transaction
Embedded verification
Biometric
Full controlVerification
over quality, accuracy
and security Server
Biometric
Template
Identity consolidationStore
/ de-
External Identity
Verification
Inter
Organisation
Acquirer
Biometric
Identification
Server
(AFIS)
Biometric
Image
Storevs Template store
Matcher server
duplication
Proprietary protocols for
Dimensioned according to
improved performance
performance & DB size.
Online transaction based
Images for Interbank operability identity verification
Secured
Open standards for compatibility Centralised
authorisation / audit
DHA
HANIS
Biometric
Store
NCCI
Certified
Identities
Ideco’s Value Proposition
In depth understanding of Governmental IDM systems
Focussed expertise in identity management solutions
National database of identities (Juristic & Natural / Criminal & Commercial)
Glue to various other statutory and commercial datasets
Technology platform for advancing Identity Profiling
A comprehensive range of “best in class” Biometric Technologies
Public sector relationship, networks and lobbying
National network of certified partners / Customer support network
Scanning and digitisation infrastructure and processes
Ongoing investment in integration and support
Marketing expertise