TechMatrix
Biometric Access Control and Identification System
TechMatrix 2009
Table of Contents
An Overview .................................................................................................................................................. 3 The Technology and the Scope ..................................................................................................................... 4 Market Analysis - Current Statistics ......................................................................................................... 5
Existing Solutions - A Detailed Depiction ................................................................................................... 6 The Need of the Hour - An Optimal Solution ........................................................................................... 10 Let Us Assist You - Costing Analysis ........................................................................................................ 12
Tech Support Specifications ........................................................................................................................ 13
2|Page
TechMatrix 2009
An Overview
Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics primarily consist of Physiological classification; related to the shape of the body (examples including fingerprint, face recognition, DNA, hand and palm geometry, iris/retina recognition and odor/scent), and Behavioral classification; related to the behavior of a person (examples including typing rhythm, gait, and voice). As a result of our increasing dependency on the ever-evolving technology, we have reached a phase where Data Security and Identity Management have never been more critical. Various organizations are now resorting to use multiple forms or modes of authentication in order to access electronic records and other sensitive data. An accurate identification system will not only help organizations combat identity theft but will help abase identification errors. As organizations engage in more automated workflows and information sharing across departments, employee identification at each point of access plays an important role in ensuring the operational efficiency and credibility while complying with regulations.
3|Page
TechMatrix 2009
The Technology and the Scope
Biometric technologies are fast becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already availing these technologies. Consequently, various industry domains stand to benefit from the advent of such a robust and reliable, cutting-edge technology; to name a few:
Healthcare Security Government Financial/banking Commercial enterprises Employee Attendance system. Educational facilities
4|Page
TechMatrix 2009
Market Analysis
Current Statistics
Biometric characteristics can be divided in two main classes:
Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent. Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice.
Ensuring the safety and maintainability of highly critical and significant data, IT industry has given us various biometric solutions to choose from, depending on our needs and requirements. 1. Palm Vein Identification system A palm print identification system in which an image of the palm pattern is optically formed and scanned to generate a video signal which is an analog of the pattern, the signal being converted into a numerical code. Because each palm print is unique, an individual is thereby given a singular identifying code number which is an index to the pattern. 2. Face Identification system A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image source. One of the ways to do this is by comparing selected facial features from the image and a facial database. 3. Retina Identification system The Retina Identification system, which uses an iris/retina pattern to identify a customer, extracts the matching bits between previously-registered iris data and obtained iris data and, compares the extracted bits with the registered iris data to increase the accuracy of customer identification.
4.
Fingerprint Identification system Automated fingerprint identification is the process of automatically matching one or many unknown fingerprints against a database of known and unknown prints. It is a closelyrelated technique used in applications such as attendance and access control systems.
5|Page
TechMatrix 2009
Existing Solutions -
A Detailed Depiction
Following are depicted some of the common biometric solutions which have been adopted to strengthen various Access and Identification applications worldwide. These biometric measures have been discussed below in features and aspects in order to provide clarity of view and the knowledge to choose. Face Identification Solution The dimensions, proportions and physical attributes of a person's face are unique. Biometric facial recognition systems will measure and analyze the overall structure, shape and proportions of the face. At enrolment, several pictures are taken of the user's face, with slightly different angles and facial expressions, to allow for more accurate matching. For verification and identification, the user stands in front of the camera for a few seconds, and the scan is compared with the template previously recorded. To prevent an image / photo of the face or a mask from being used, face biometric systems will require the user to smile, blink, or nod their head. Also, facial thermographs can be used to record the heat of the face (which won't be affected by a mask). The main advantage with the Face Identification system is that it is Not intrusive, can be done from a distance, even without the user being aware of it (for instance when scanning the entrance to a bank or a high security area).
However, Face biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's face by wearing a mask, a nose extension, etc. Also, it affects User perceptions / civil liberty: Most people are uncomfortable with having their picture taken. The procedure is very time-consuming; takes approximately 15-20 secs/ face recognition The solution is quite expensive; involves various minute and costly parts.
6|Page
TechMatrix 2009
Retina Identification Solution The blood vessels at the back of the eye have a unique pattern, from eye to eye and person to person. Retina scans require that the person removes their glasses, place their eye close to the scanner, stare at a specific point, and remain still, and focus on a specified location for approximately 10 to 15 seconds while the scan is completed. A retinal scan involves the use of a low-intensity coherent light source, which is projected onto the retina to illuminate the blood vessels which are then photographed and analyzed. A coupler is used to read the blood vessel patterns.
A retina scan cannot be faked as it is currently impossible to forge a human retina. Furthermore, the retina of a deceased person decays too rapidly to be used to deceive a retinal scan. A retinal scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being sometimes as high as 1 in 500. However, the enrollment and scanning for retinal identification are intrusive and slow. Also, the Retinal Identification system is a very expensive application and this defines its incapability for use in cases where price may be a factor.
Fingerprint Identification Solution A fingerprint is made of a number of ridges and valleys on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%. Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics. The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound. There are two main algorithm families to recognize fingerprints: Minutia matching compares specific details within the fingerprint ridges. At registration (also called enrollment), the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template.
7|Page
TechMatrix 2009
Pattern matching compares the overall characteristics of the fingerprints, not only individual points. Fingerprint characteristics can include sub-areas of certain interest including ridge thickness, curvature, or density. During enrollment, small sections of the fingerprint and their relative distances are extracted from the fingerprint.
However, The tip of the finger is a small area from which to take measurements, and ridge patterns can be affected by cuts, dirt, or even wear and tear. Acquiring high-quality images of distinctive fingerprint ridges and minutiae is complicated task. People with no or few minutia points (surgeons as they often wash their hands with strong detergents, builders, people with special skin conditions) cannot enroll or use the system. The number of minutia points can be a limiting factor for security of the algorithm. Results can also be confused by false minutia points (areas of obfuscation that appear due to low-quality enrollment, imaging, or fingerprint ridge detail).
Palm Vein Identification Solution The pattern of blood veins is unique to every individual, even among identical twins. Palms have a broad and complicated vascular pattern and thus contain a wealth of differentiating features for personal identification. Furthermore, it will not vary during the person's lifetime. It is a very secure method of authentication because this blood vein pattern lies under the skin. This makes it almost impossible for others to read or copy. An individual's vein pattern image is captured by radiating his/her hand with nearinfrared rays. The reflection method illuminates the palm using an infrared ray and captures the light given off by the region after diffusion through the palm. The deoxidized hemoglobin in the in the vein vessels absorbs the infrared ray, thereby reducing the reflection rate and causing the veins to appear as a black pattern. This vein pattern is then verified against a preregistered pattern to authenticate the individual.
As veins are internal in the body and have a wealth of differentiating features, attempts to forge an identity are extremely difficult, thereby enabling a high level of security.
8|Page
TechMatrix 2009
In addition, the sensor of the palm vein device can only recognize the pattern if the deoxidized hemoglobin is actively flowing within the individual's veins. In addition, the Palm Vein Identification Solution is an efficient and reliable application; while being very cost-effective to aid the users consideration. This system is not dangerous; a near infrared is a component of sunlight: there is no more exposure when scanning the hand than by walking outside in the sun.
9|Page
TechMatrix 2009
The Need of the Hour
An Optimal Solution
We aim to empower our clients by providing a highly reliable and consistent biometric authentication system based on Palm Vein pattern Recognition technology. This application features industry-leading authentication accuracy with extremely low false rates, and the nonintrusive and contactless integrated reader device provides ease of use with virtually no physiological restriction for all users.
This application is a logical solution for those situations where identification and access control is critical. As this innovative technology is difficult to forge and highly secure, the application is provided with an extra layer of necessary protection while ensuring an easy user interface suitable for the work environment.
10 | P a g e
TechMatrix 2009
PRACTICAL APPLICATIONS OF PALM VEIN BIOMETRICS
Security systems: physical admission into secured areas with door lock and integrated
building security systems
Log-in control: network or PC access Healthcare: ID verification for medical equipment, electronic record management Banking and financial services: access to ATM, kiosks etc.
BENEFITS OF THE PALM-VEIN BIOMETRICS The users of the application will reap vast benefits with this application as not only they will guarantee total safety of their critical data; they will also enjoy unprecedented control management over it. Our clients are empowered to gain a significant advantage over their competitors owing to the efficient access control and identification system; thus ensuring much better management of their critical data. The application brings about revolutionary changes for our users:
Improved services through enhancement of secured information sharing capabilities Reduced organizational expenses and administrative tasks Assistance with combating fraudulent activities Easily integrated with existing software Difficult to forge Contactless, hygienic and non-invasive Highly accurate Capable of 1:1 and 1:many matching Non-invasive, contactless and highly accurate biometric technology
"Healthcare organizations, government agencies, financial institutions and many other global enterprises, rely on Palm Secure as a cost-effective, highly accurate authentication solution"
11 | P a g e
TechMatrix 2009
Let Us Assist You
Costing Analysis
12 | P a g e
TechMatrix 2009
Tech Support Specifications
We ensure our clients extended support and maintenance as per the following norms:
Technical Support after Warranty and change request can be considered as actual as per the requirement (Using Effort Estimation). Integration with other technology (i.e. Smart Card, Door Closer Technology, etc.) will be charged as actual of effort estimation.
13 | P a g e