Elsag Datamat Corporate presentation

Download Report

Transcript Elsag Datamat Corporate presentation

Italdata Ingegneria dell’Idea
Biometrics, an effective tool in
the Justice world
Pierpaolo Murrieri, PhD
Project Manager
Biometrics
Biometrics (from the ancient Greek bios, or life, and
metros, or measurement) embraces a series of
techniques to ascertain the identify of individuals by
”decoding” their morphological features.
3.700.000 B.C.
19-th Century
Today
Biometrics – A Growing Interest
• Today, the need for biometric solutions is growing at
international, state and local government level for
– Defense and administration applications
– Security infrastructure for business networks
– Government applications (i.e. criminal investigation,
territorial control, electronic documents)
– Protection of financial transactions in the banking sector
– Security of critical environment (i.e. Gas and Oil plants,
airports)
Biometrics Solutions
• Many different methods of biometric identification:
– Face and facial thermograph
– Iris and retina recognition
– Palm geometry and veins
– Voice recognition
– Signature matching
• The most widely adopted, simple to use and reliable technology is
digital fingerprint recognition, which has the longest history of
proven effectiveness in criminal investigations.
Criminal investigation
• Criminal investigation is the most inbred field of
application for fingerprint identification.
• Police departments commonly use AFIS (Automated
Fingerprint Identification Systems) and APFIS
(Automated Palmprints and Fingerprints Identification
Systems) in order to identify criminals from their latent
fingerprints.
• There are huge databases of fingerprints and palm
prints:
– Criminal
– Civil
Chile – A case study
• Chile is one of the country that mostly use fingeprints for
Justice applications.
• 4 AFIS
–
–
–
–
Carabineros de Cile (Criminal, Italdata)
Polizia Investigativa (Criminal, Italdata)
Gendarmeria de Chile (Criminal, Italdata)
Registro Civil (Civil)
• Criminal AFIS used
– during the investigation process
– manage entrance/exit of convicts from Jail.
Integrations - Carabineros
• PSS (mobile unit for territorial control) to Carabineros de
Cile
– Verification processes
– Identification processes
– License plate reading
+ RUT
Search
Verify
Search Result
Verification
Result
AFIS
License
AFIS
Registro
Plates
Carabineros
Civil
Hotlist
Jail Management System –
Gendarmeria de Cile
• Objective of the system is that to allow the univocal
identification of prisoners, using the fingerprint
identification technology, in order to execute identity
checks during entry and exit phases of prisoners from
any Penalty Units, maintaining trace of each transaction
during the time.
JMS – Workflow Enrollment
The prisoner
is conducted to the
Penalty Unity
Biometric Data
are acquired
Search
AFIS Data Base
Search Results and Old or New Unic ID code
Unic ID Code
A search is launched
Inside the existing
AFIS Data Base
JMS – Workflow Prisoner Exit
YES
Jail Management
System Data Base
(JMS)
Log of transaction results
and “status” update inside the
Jail Management System DB
AFIS Data Base
Unic ID Code
No Exit Allowed!
The Identity
Check is
OK?
Search Results
NO
Search
The List of Prisoners
That should exit every day
Is Biometrically
Checked in few seconds
1 to n
JMS – Workflow Prisoner Entry
The Identity
Check is
OK?
YES
Jail Management
System Data Base
(JMS)
Log of transaction results
and “status” update inside the
Jail Management System DB
AFIS Data Base
Unic ID Code
NO
Search results
Specific related
Activities needed in
order to properly
manage the case
Search
The Prisoner’s Identity
Is Biometrically
Checked in few seconds
1 to n
Electronic Surveillance
• Judges, law and penitentiary authorities assign punishments for
offenders in accordance with their own legal regulations. Depending
on the specific case, some (typically short) penalties may be
executed out of the jails.
• In general, dealing with convicts who are not in jail entails:
– more costs in human resources (police officers or surveillance
entities) in order to observe them (need = optimize control
processes);
– lower levels of security (need = continuous and uninterrupted
control).
• To answer to these needs, Italdata has developed new electronic
surveillance tools, by which it is possible to automatically and
continuously monitor convicts subject to both perimeter and
tracking constraints.
ESS
• The ESSII (Electronic Surveillance System) and ESSI&O
(Electronic Surveillance System Indoor & Outdoor) are electronic
systems that are devoted to support surveillance entities in the
process of controlling prisoners under house arrest or in limited
freedom.
• In addition to a constant monitoring of the person’s presence within
the designated area, it notifies the surveillance authorities all
anomalous events issuing alarm messages in case of lock
tampering or escape.
ESS Components
The system is composed of:
• A transmitter, the “electronic bracelet”
It’s the mobile component of the control device and it’s fitted around the
subject’s ankle.
• A fixed or a mobile receiving station, the “base”
It’s the area localizer device. It’s installed in the house of the subject under
control or can be carried out. It receives data from the transmitter and
exchange information or alarms respect the remote operation center
through a fixed or GSM the telephone line or through a GPRS or ADSL
connection (in the fixed configuration).
• An “operation center”
Responsible of remote system configuration, polling and alarms or events
handling.
Logical Accesses –
An improvement to security
• Personal data (username, password, personal certificates ) can be
stored on the smart card and protected by fingerprint recognition.
• The ID-Pocket device is designed to provide access to information
systems using cryptographic smart cards and PIN-free user
biometric recognition tecniques.
• The entire identification process is managed by ID-Pocket and no
biometric data is exchanged or stored in a database nor in the
personal computer neither in a remote server. (MOD – Match On
Device technology)
ID-Pocket
• Through a previous enrollment the biometric data are
stored on a Smart Card.
• All the data stored on the card will only be accessible
through the device.
• The biometric data will be ONLY stored in the smart
card that is owned by the user, there is no “privacy”
concern.
• The authentication process can be performed by using a
PKI (Public Key Infrastructure) or by storing personal
information in the card.
Overall view
Justice
PSS
AFIS
JMS
ESS
Investigation
Penalty
ID-POCKET
ICT
Thank You!
Pierpaolo Murrieri, PhD
Italdata Ingegneria dell’Idea
Viale Eroi di Cefalonia, 123
00128 Rome (Italy)
Phone: +39 06 50797837
Email: [email protected]
Templates
• Minutiae, basic information extracted from a fingerprint:
– Ridge ending
– Bifurcations
• Fingerprint patterns
– Arches
– Loops
– Whorls