We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySkylar Ervine
Modified over 2 years ago
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon
© Daon Confidential Daon – Company Profile Global provider of identity related software products –Founded in 2000 –We work with customers and partners in every region of the world –Offices in Washington DC (HQ), Dublin, London, Dubai and Canberra (Australia) We create software products that Enable a new generation of Biometric Identity Solutions –Flexible products, intended for integration –Focus on large-scale population-centric® environments –Focus on identity life-cycle –Open and multi-modal –Focus on modernization
© Daon Confidential Pre-Enrollment Provide biographic information Pay fees Receive instructions Capture Biographics Enter biographic data or Verify/correct pre-enrollment data Identity Proofing Scan identity documents Validate documents Identity Investigation Biometric duplicate checks Vetting Complete Prepare Card Data Generate templates Sign card data Card Issuance Produce Card Provide to Citizen Operational Usage Citizen presents card and biometric Capture Biometrics Capture ten fingerprints Capture iris (optional) Capture face (optional) Identity Investigation Criminal history checks Name based checks National Identity Systems
© Daon Confidential National Security – Traditional Approach – Separate Identity Systems Add Identity / Biometrics Passport Identity / Biometrics Citizen IDForeign ID Identity / Biometrics Separate Systems Passport Citizen ID Foreign ID Existing Systems
© Daon Confidential Identity Management System New Approach - Unified Identity Management IntegratedBiometricServices Refugees / Asylum Border Management Visas / Permits Foreign ID Citizen ID Passport IdentityDatabase
© Daon Confidential Biometric Identity Assurance Requirements are Evolving Authentication/Identification Identity Assurance One project at a time An infrastructure for multiple systems Engineering/Technology Led Business Process and Change Mgt Led Client-Server based Service-Oriented Architectures Fingerprint-centric Multi-Biometric Single Vendor COTS based, Multi-Vendor Framework Compliance Compliance plus Adaptability Biometric matching performance Enterprise Systems Performance Proprietary Standards-based with interoperability From To Disparate Federated
© Daon Confidential Copywrite Daon 2006 National ID Business Challenges The failure to prevent duplicate identities results in significant financial loss and questions regarding a national identity schemes integrity Biographic only duplicate checking algorithms have failed In may countries - the current issuing processes may have created a large number of duplicate identities –Identity duplication and identity creation increase the levels of fraud, waste and abuse In many cases enrolment is an offline process taking multiple days before card issuance
© Daon Confidential All Biometrics Have Limitations BiometricFARFRRFTE Face1.00%1%0.1% 0.10%2%0.1% 1-Finger1.00%0.01%2.5% 0.01%0.6%2.5% 2-Finger1.00%0.01%1.5% 0.01%0.1%1.5% 4-Finger0.10%0.01%0.8% 0.01%<0.01%0.8% 8-Finger0.10%<0.01%0.3% 0.01% 0.3% 10-Finger0.10%<0.01%0.2% <0.01%0.01%0.2% 1-Iris0.10%1.2%2.5% 0.01%1.5%2.5% 0.001%1.9%2.5% %2.0%2.5% 2-Iris0.10%0.5%4% 0.01%0.6%4% 0.001%0.8%2.5% %1.2%2.5% Iris has a high Failure-to-Enroll rate up to 2.25 Million in 45 Million population but extremely low False Accept rate Fingerprints achieve good accuracy and efficient processing only when multiple fingers are enrolled Face has a high False-Rejection rate FAR = False Accept Rate FRR = False Reject Rate FTE = Failure To Enroll
© Daon Confidential False Matches During Duplicate Checks Require Additional Processing FAR50 Million 100 Million 5%2.5M5M 2.5%1.25M2.5M 1%500,0001M 0.1%50,000100, %5,00010, %5001, %50100 Two ways to reduce these false hit rates are: Manually Automatically using a second biometric Number of False Hits Per Search High false accept rate could lead to 2.5M false hits when searching a population of 50M for duplicates.
© Daon Confidential Copywrite Daon 2006 Representative ways to address large scale National ID challenges Introduction of Multiple Modes of Biometrics Algorithms that best address most difficult challenge for this population and application –Even within a mode like fingerprints certain algorithms perform better with certain population types –Accuracy/performance tuned to population Population filtering to reduce effective biometric population Continual technology refresh: incorporating latest algorithms, devices, IT hardware and new products Continual and automatic updating of enrolled biometric data
© Daon Confidential Algorithm Accuracy/Performance tuned to population Different demographics produce different accuracies Age, ethnic origin, gender, etc. 51 to 65 year-olds significantly worse with this device-algorithm Age is a disadvantage here Opposite is true for face biometrics; an older face is more unique Configuration must be made based on observed population Tuning for deployment population is vital
© Daon Confidential Continual Technology Refresh A solution that will last for 30+ years must be prepared for major technology advancements during that time….. –Better matching algorithms (e.g ultrasound, fused hand and finger geometry) –Better biometric data capture and verification devices –New biometric types (DNA, Voice, Iris in motion…….) –Changes in process and policy –Improvements in Infrastructure Database Operating System Back office processing hardware
© Daon Confidential Continual and automatic updating of biometric data Storage of multiple instances of same biometric, captured at different times, to increase accuracy Updating of enrolment data if higher quality data later captured (e.g. at verification) Template aging – refresh of enrolment data Seamless migration to improved devices and algorithms –Through image storage and open standards Frequent reporting of biometric performance; problem prevention Ongoing threshold configuration and tuning based on offline analysis of recorded biometrics Automated detection of problem devices/sensors through increased error rates (FTE, FTA, FRR) beyond allowed deviations
© Daon Confidential 14 Which meant: Restoring the efficacy and credibility to the Nations immigration system Daons software powers the identity management platform authenticating all foreign nationals Deploying solutions in diverse locations; from detention centers to fishing boats AUSTRALIA ASKED US TO DESIGN AND IMPLEMENT AN IDENTITY AT EVENT SYSTEM TO PROTECT NATIONAL BORDERS AND IMMIGRATION
© Daon Confidential The case of Cornelia Rau
© Daon Confidential 16 The EU was faced with unprecedented movement of people (a hallmark of a modern society) requiring a pan EU biometric based VISA system Which meant: Daon helped design and is implementing a EU wide system that will prevent chronic security risks, such as VISA shopping Daon software will power a system to serve 70 million people THE EU SELECTED A DAON BASED SOLUTION TO DESIGN AND IMPLEMENT A PAN EU VISA SYSTEM FOR ALL 27 MEMBER STATES
© Daon Confidential miSenseplus - Registered Traveller Arrival in Dubai miSense card compatible with Dubai eGate infrastructure and Hong Kong equivalent. Traveller verified against local watch list database. Biometric card issued Biometric card issued and accepted a proxy for passport Fingerprint biometric and passport biographical information stored. ICAO standard encryption. ePassport version 2, similar to existing national identity cards. Identity Enrolment Dedicated enrolment station within existing UKIS facility. 13 Biometrics recorded and stored within existing UKIS biometric database. Background checks conducted and card activated within miSense system.
© Daon Confidential Summary - Common Approach to Large Populations Where possible enroll multiple biometrics –Virtually eliminates failure to enroll Consider Iris for duplicate checking Provide ICAO compliant quality facial images for human arbitration –Enables use of second biometric to improve accuracy and/or resolve false hits –Maximizes the long term payoff of the most cumbersome part of the entire processenrollment The incremental cost of enrolling multiple biometrics over time is small Take advantage of fingerprint biometrics and low cost sensors for automated 1:1 verifications of identity Populations can be divided into multiple matching subsystems tuned for specific population characteristics Develop an enroll once use many strategy Focus on implementing standards-based business processes such as BIAS
© Daon Confidential Thank You Leo Ring
Introducing Oracle Insurance Chuck Johnston Vice President Strategy and Alliances Insurance Global Business Unit.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Federal Aviation Administration NAS Enterprise Information System Security (NEISS) Vic Patel, FAA ICAP, ACP WG-I May 28 th – 30 th 1.
Microsoft Business Value Planning Services Microsoft has launched a new Software Assurance benefit to help customers identify, unlock, and capture the.
1 Online payments How do we purchase on the web? What choices of payment have we?
Building a Better IT Support Model: Making Banner Work Presented by: Bill Balint, Indiana University of Pennsylvania.
© Copyright 2007 Exempler Telecom Test Automation System Exempler - We pride ourselves with providing lightweight robust engineering solutions.
Enerjetic Strengths Enerjetic is not marketed as a technology company, we are a data company. One that identifies business value through data and delivers.
©2010 HP Confidential1©2009 HP Confidential1 OPEN DAYS 2010 HP Workshop e-Government - The Platform for Modern Regional Cooperation Sasha Bezuhanova Director.
©2010 HP Confidential1©2011 HP Confidential1 OPEN DAYS 2011 HP Workshop PPP - New business models in ICT intensive public services delivery Sasha Bezuhanova.
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Kunal Kodkani Senior Consultant Microsoft Corporation.
2001 Prentice Hall, Inc. All rights reserved. Chapter 4, Online Monetary Transactions Outline 4.1Introduction 4.2Credit-Card Transactions Anatomy.
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Cerner Presentation to S&I esMD Workgroup – Industry Scan Senior Director and Solution Strategist – Compliance John Travis.
ID Based Smart Card Projects A success story. India S.K.Sinha National Informatics Center 2 of 30 The Indian Success Story - Necessity the Mother of evolution.
How Microsoft does end-to-end IT Security Bruce Cowper Senior Program Manager, Security Initiative Microsoft Canada.
Biometrics Identification and Registration System by Hisplus Systems Limited Tel:
® IBM Research Division © 2006 IBM Corporation Real-Time Business Assurance November 8, 2006 Chung-Sheng Li DGM, Security, Privacy and eXtensible technologies.
IRS Enterprise Architecture 1 Service Oriented Architecture Discussion Modernization Through Business and Technology Transformation Avi Bender Director,
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty.
Presented to: SOA Brown Bag #12 By: Paul Caron, SWIM T&E Lead Date: December 13, 2011 Federal Aviation Administration System Wide Information Management.
© 2007 IBM Corporation The Business Value of Information N Glen Grant Alliance Manager 25 May 2007.
Dr. Daniel Sabbah Vice President of Strategy & Technology IBM Software Group Bringing Grid & Web Services Together Globus World San Francisco, CA Tuesday,
PRISM ® : Intelligent Fraud Monitoring Presentation to Retail Decisions, Inc
Copyright © SDA Software 2003 SDA Application Platform Suite Stay ahead, Design your business, Achieve your goal!
12 September 2012 Recruitment International BDO Robert Drake, Safe Screening.
© 2016 SlidePlayer.com Inc. All rights reserved.