We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byFred Yarrow
Modified over 2 years ago
Labcal. © 2004 Labcal. Presented by: Mr. Gregory McConnell Partner & Director of Business Dev. Labcal. Todays Biometric Projects Need Mobile & Handheld Readers. Why.? Applications and Readers
Labcal. © 2004 Labcal. About Labcal 1.0Intro: Mobile biometric readers. Why? and Why Now? 2.0Applications for handheld & Mobile biometric devices 3.0Basic functionalities of the devices 4.0Specific features and functionalities 5.0What do they look like? How much do they cost? 7.0Projects around the world who need or use Mobile & Handheld biometric readers. 8.0 Case Study. Major Indonesian Oil Refinery
Labcal. © 2004 Labcal. With 9-11, vulnerabilities in traditional ID and travel documents systems are exposed. Same for Access control. People want and accept more security. Gone from using biometrics to protect very few and specific things/places (servers, rooms, files, etc) to ID and authenticate a relatively small number of people. …to wanting to ID and Authenticate masses of people, over large territories, in the multitude of places we may find them. In this new context: –People dont/cant always come to authentication point (door,desk/PC) –The technology has to go out to them. –Away from door, desk/PC/ Out to vehicle, ship, gate, home and field. 1.0 Mobile/Handheld biometric readers Why Now?
Labcal. © 2004 Labcal Applications -Travel document: Land border (up-stream pre-clearance), Seaport (ID verification onboard ship), Airport, land border customs - Employee ID Card: Seafarer, Military, Transportation, Customs/Immigrations, Utilities employee, etc. - Physical Access Control / Time and Attendance: - RA: airport, seaport, power plant, government buildings, etc - Gate Access control: Military Base, tarmac, secured perimeter - ID verification on board vessels, busses, troop carriers, trains, etc. - Civilian ID applications: - National ID (Plane pre-boarding, Land boarder, legal age proof) - Drivers license, healthcare card, permanent resident card, etc.
Labcal. © 2004 Labcal Basic functionalities of the devices ID verification (biometric matching = 1: 1) Read credentials off an ID documents memory (chip or other) Verify the validity of the document and its issuing authority Authentication of owner of the document, using biometrics (template stored in documents memory) Display result of authentication + ID credentials Register transaction in log file or send live to server
Labcal. © 2004 Labcal Specific features and functionalities Identification (biometric matching = 1: n) Read and capture an AFIS quality fingerprint template in order to Identify an individual without any other ID than fingerprint biometrics (template in DB on server). Send biometric template live to an Identification server though wireless communication for 1; n identification. Receive feedback from server and display to operator for action.
Labcal. © 2004 Labcal Specific features and functionalities Validation of Origin –Digital/electronic signature signature (digital/electronic certificates) Verification of Data Integrity –Digital/electronic signature (DSA, DSS, RSA) Establishing Trusted Communication between card and reader or reader and server. –SAM (Security Access Module) Ruggedized and/or weatherized
Labcal. © 2004 Labcal What do they look like? Optical fingerprint reading Mag-stripe card reader Optional 2D barcode reader Alpha-numeric keypad Monochrome Graphical LCD OS: Proprietary
Labcal. © 2004 Labcal. Capacitive fingerprint sensor Contact smart card reader Alpha-numeric keypad Color Graphical LCD OS: Windows CE Wireless: Optional Bluetooth and GSM modules 6.0 What do they look like?
Labcal. © 2004 Labcal. Capacitive fingerprint sensor Contactless smart card reader Optional: 2D barcode reader Navigational keypad Monochrome Graphical LCD OS: Proprietary 6.0 What do they look like?
Labcal. © 2004 Labcal. Capacitive fingerprint sensor Contact smart card reader Contactless smart card reader Optional 2D barcode Navigational keypad + programmable function keys Touch Screen Graphical color LCD OS: Windows CE Ruggedized Car and desktop dockings. Wireless: Wi-Fi and GSM 4 Band 6.0 What do they look like?
Labcal. © 2004 Labcal How much do they cost? - Varies between 1000$ and 3000$ - High quantity (hundreds of readers) implementations: Varies between 600$ and 2000$
Labcal. © 2004 Labcal Projects who need/use Mobile&handheld readers USA Project: Common Access Card (CAC) Solicitor: The U.S DoD Project: Transportation Worker Identification Credential (TWIC) Solicitor: Transportation Security Administration (TSA/DHS) Application: US Military Bases overseas Access Control Solicitor: DMDC (Defense Manpower Data Center) Project: Airport Tarmac Vehicle Access Control Solicitor: TSA
Labcal. © 2004 Labcal. Canada Project: Restricted Area Identification Card Solicitor: Canadian Air Trans. Security Authority (CATSA) Project: Permanent Resident Card Solicitor: Canadian Customs & Revenue Agency (CCRA) Potential Project: Canadian National ID Card Solicitor: CIC/Passport Office Potential Project: New Canadian e-passport Solicitor: Canadian Passport Office 7.0 Projects who need/use Mobile&handheld readers
Labcal. © 2004 Labcal. World Project: Saudi National ID Card (CAFIS) Solicitor: Saudi Ministry of Interior Project: Colombian National ID (Cedula) Solicitor: Colombian Federal Government Project: National ID Card of El Salvador (DUI) Solicitor: El Salvador Fed. Gov. Malaysian National ID Card (MyKad) Solicitor: Both Government and Public Sectors 7.0 Projects who need/use Mobile&handheld readers
Labcal. © 2004 Labcal. 8. Case Study: Indonesian Oil refinery Object: Biometric ID Card for employees and staff vehicles Purpose: Track movement and attendance of staff around the plant + control access to plant and to different restricted areas. Technology: 5,000 Contactless Smart Card (ISO A) Fingerprint biometrics (minutia based algorithm for 1: 1 matching) Handheld, batery operated, fingerprint + smart card reader 1) Client application (enrolment), 2) Web application (Log file download + System management, event reporting, etc.)
Labcal. © 2004 Labcal.
Labcal. © 2004 Labcal.
Labcal. © 2004 Labcal. Thank You!
Hosted by: June 23-26, 2003 New York City Mobile & Handheld Readers The Need for Mobile & Handheld Readers in Today's Biometric.
Hosted by: June 23-26, 2003 New York City ID Card Projects Large Scale ID Projects Based on Biometrics (Specifically Fingerprint)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
THE MALAYSIAN ELECTRONIC PASSPORT TWELFTH SESSION OF THE FACILITATION DIVISION by Dato’ Mohd Jamal Kamdi Director General of Immigration, Malaysia.
Smart Cards MD823 October 6, The Smart Card Value Proposition Secure storage for sensitive data and monetary value Decreases fraud rates compared.
RCG Holdings Limited LSE AIM: RCG HKSE: 802 Bus Ticketing Solution Presentation March 2010.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Liberian Registry INTERTANKO ASSOCIATES COMMITTEE MEETING March 29, 2006.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
FIT3105 Smart card based authentication and identity management Lecture 4.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Its alright to laugh for who is allowed in. Its alright to laugh for who is allowed in. HiPath SIcurity Card Manager Smartcard Management and Personalization.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next Input device is any hardware component used to enter data or instructions.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
1 UTC Fire & Security EMEA BioScrypt (OVP) 4G Series BioScrypt (OVP) 4G Lite Series 4G Lite Slimline BioMetric Readers Lite & Station Lite 4G L April 2014.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
VOTING IN WISCONSIN - AND - THE VOTER PHOTO ID LAW Speaker’s Bureau Government Accountability Board.
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Serving Those Who Serve Our Country Michael P. Butler DMDC Deputy Director for Identity Services and Personnel Security / Assurance June 18, 2013.
Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT.
MDT-2000 and basic dispatch software Press “page down” to view screens.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
RFID Access Control System March, 2003 Softrónica.
CSC Proprietary Data Border Control System. CSC Proprietary Data AGENDA Context, Digital Trust and Unified Entitlement Mgmt Project & System overview.
Meganet Corporation VME Sign Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Department of Labor HSPD-12 Created: October 27 th, 2006 Last Updated: August 20, 2007 A guide to what you can expect from the PIV-II process Audio commentary.
Current Technology and the TWIC Program Walter Hamilton Chairman, International Biometric Industry Association Sr. Consultant, Identification Technology.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
Ss Symbol Technologies Security Forum - Airline Security Michael Attar SITA Airport and Desktop Services Director Technical Design.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Confidential Iris Authenticati on System Optics and Digital System.
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Cerner Presentation to S&I esMD Workgroup – Industry Scan Senior Director and Solution Strategist – Compliance John Travis.
Q. I don't have access to a.mil account, can I still sponsor someone on base? A. Yes, however, the sponsor must be present with the visitor at the time.
29 to 31 October 2007 Interpol - 5 th Special Meeting of the Counter-Terrorism Committee Border Management and People Clearance The Singapore Experience.
SecurePak Electronic tamper detection for packaging developed by Cypak and Swedish Postal Service.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
By : Injeong Lee 9CC. 1. Creator of this Presentation 2. What is Digital Security? 3. Why is Digital Security important? 4. How does Digital.
Physical Security Concerns for LAN Management By: Derek McQuillen.
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
UNIW RLD WIRELESS. What If You Could… Send and Receive s from the beach? Schedule a meeting on your commute to work? Forward an urgent message.
Chapter 10: Authentication Guide to Computer Network Security.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
© 2017 SlidePlayer.com Inc. All rights reserved.