tech matrix palm information

13
 TechMatrix Biometric Access Control and Identification System

Upload: nital-shekhat

Post on 06-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 1/13

 

TechMatrix

Biometric Access Control and Identification System

Page 2: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 2/13

TechMatrix 2009

2 | P a g e  

Table of Contents

An Overview .................................................................................................................................................. 3

The Technology and the Scope ..................................................................................................................... 4

Market Analysis - Current Statistics ......................................................................................................... 5

Existing Solutions - A Detailed Depiction ................................................................................................... 6

The Need of the Hour - An Optimal Solution........................................................................................... 10

Let Us Assist You - Costing Analysis ........................................................................................................ 12

Tech Support Specifications ........................................................................................................................ 13

Page 3: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 3/13

TechMatrix 2009

3 | P a g e  

 An Overview

Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic

physical or behavioral traits. In information technology, in particular, biometrics is used as a form

of identity access management and access control. It is also used to identify individuals in groups

that are under surveillance.

Biometric characteristics primarily consist of Physiological classification; related to the shape of 

the body (examples including fingerprint, face recognition, DNA, hand and palm geometry,

iris/retina recognition and odor/scent), and Behavioral classification; related to the behavior of a

person (examples including typing rhythm, gait, and voice).

As a result of our increasing dependency on the ever-evolving technology, we have reached a phasewhere Data Security and Identity Management have never been more critical. Various organizations

are now resorting to use multiple forms or modes of authentication in order to access electronic

records and other sensitive data. An accurate identification system will not only help organizations

combat identity theft but will help abase identification errors. As organizations engage in more

automated workflows and information sharing across departments, employee identification at each

point of access plays an important role in ensuring the operational efficiency and credibility while

complying with regulations. 

Page 4: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 4/13

TechMatrix 2009

4 | P a g e  

The Technology and the Scope 

Biometric technologies are fast becoming the foundation of an extensive array of highly secure

identification and personal verification solutions. As the level of security breaches and transaction

fraud increases, the need for highly secure identification and personal verification technologies is

becoming apparent.

Biometric-based solutions are able to provide for confidential financial transactions and personal

data privacy. The need for biometrics can be found in federal, state and local governments, in the

military, and in commercial applications. Enterprise-wide network security infrastructures,

government IDs, secure electronic banking, investing and other financial transactions, retail sales,

law enforcement, and health and social services are already availing these technologies.

Consequently, various industry domains stand to benefit from the advent of such a robust and

reliable, cutting-edge technology; to name a few: 

  Healthcare

  Security

  Government 

  Financial/banking

  Commercial enterprises

  Employee Attendance system.

  Educational facilities 

Page 5: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 5/13

TechMatrix 2009

5 | P a g e  

Market Analysis - Current Statistics 

Biometric characteristics can be divided in two main classes:

  Physiological are related to the shape of the body. Examples include, but are not limited to

fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has

largely replaced retina, and odor/scent.

  Behavioral are related to the behavior of a person. Examples include, but are not limited to

typing rhythm, gait, and voice. 

Ensuring the safety and maintainability of highly critical and significant data, IT industry has given

us various biometric solutions to choose from, depending on our needs and requirements.

1.  Palm Vein Identification system

A palm print identification system in which an image of the palm pattern is optically formed

and scanned to generate a video signal which is an analog of the pattern, the signal being

converted into a numerical code. Because each palm print is unique, an individual is thereby

given a singular identifying code number which is an index to the pattern.

2.  Face Identification system

A facial recognition system is a computer application for automatically identifying or

verifying a person from a digital image source. One of the ways to do this is by comparing

selected facial features from the image and a facial database.

3.  Retina Identification system

The Retina Identification system, which uses an iris/retina pattern to identify a customer,

extracts the matching bits between previously-registered iris data and obtained iris data

and, compares the extracted bits with the registered iris data to increase the accuracy of 

customer identification.

4.  Fingerprint Identification system 

Automated fingerprint identification is the process of automatically matching one or many

unknown fingerprints against a database of known and unknown prints. It is a closely-

related technique used in applications such as attendance and access control systems. 

Page 6: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 6/13

TechMatrix 2009

6 | P a g e  

Existing Solutions -  A Detailed Depiction 

Following are depicted some of the common biometric solutions which have been adopted to

strengthen various Access and Identification applications worldwide. These biometric measures

have been discussed below in features and aspects in order to provide clarity of view and the

knowledge to choose.

Face Identification Solution

The dimensions, proportions and physical attributes of a person's face are unique. Biometric

facial recognition systems will measure and analyze the overall structure, shape and

proportions of the face.

  At enrolment, several pictures are taken of the user's face, with slightly different angles

and facial expressions, to allow for more accurate matching.

  For verification and identification, the user stands in front of the camera for a few

seconds, and the scan is compared with the template previously recorded.

  To prevent an image / photo of the face or a mask from being used, face biometric

systems will require the user to smile, blink, or nod their head. Also, facial

thermographs can be used to record the heat of the face (which won't be affected by a

mask).

  The main advantage with the Face Identification system is that it is Not intrusive, can be

done from a distance, even without the user being aware of it (for instance whenscanning the entrance to a bank or a high security area).

However,

  Face biometric systems are more suited for authentication than for identification

purposes, as it is easy to change the proportion of one's face by wearing a mask, a nose

extension, etc.

  Also, it affects User perceptions / civil liberty: Most people are uncomfortable with

having their picture taken. 

  The procedure is very time-consuming; takes approximately 15-20 secs/ face

recognition 

  The solution is quite expensive; involves various minute and costly parts. 

Page 7: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 7/13

TechMatrix 2009

7 | P a g e  

Retina Identification Solution

The blood vessels at the back of the eye have a unique pattern, from eye to eye and person to

person.

  Retina scans require that the person removes their glasses, place their eye close to the

scanner, stare at a specific point, and remain still, and focus on a specified location for

approximately 10 to 15 seconds while the scan is completed.

  A retinal scan involves the use of a low-intensity coherent light source, which is

projected onto the retina to illuminate the blood vessels which are then photographed

and analyzed.

  A coupler is used to read the blood vessel patterns.

A retina scan cannot be faked as it is currently impossible to forge a human retina. Furthermore,

the retina of a deceased person decays too rapidly to be used to deceive a retinal scan. A retinal

scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being

sometimes as high as 1 in 500.

  However, the enrollment and scanning for retinal identification are intrusive and slow.

  Also, the Retinal Identification system is a very expensive application and this defines its

incapability for use in cases where price may be a factor. 

Fingerprint Identification Solution

A fingerprint is made of a number of ridges and valleys on the surface of the finger. The

uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as

the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right 

loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for

10%.

Fingerprints are usually considered to be unique, with no two fingers having the exact same

dermal ridge characteristics. The main technologies used to capture the fingerprint image with

sufficient detail are optical, silicon, and ultrasound.

There are two main algorithm families to recognize fingerprints:

  Minutia matching compares specific details within the fingerprint ridges. At registration

(also called enrollment), the minutia points are located, together with their relative

positions to each other and their directions.

  At the matching stage, the fingerprint image is processed to extract its minutia points,

which are then compared with the registered template.

Page 8: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 8/13

TechMatrix 2009

8 | P a g e  

  Pattern matching compares the overall characteristics of the fingerprints, not only

individual points. Fingerprint characteristics can include sub-areas of certain interest 

including ridge thickness, curvature, or density.

  During enrollment, small sections of the fingerprint and their relative distances are

extracted from the fingerprint.

However,

  The tip of the finger is a small area from which to take measurements, and ridge

patterns can be affected by cuts, dirt, or even wear and tear.

  Acquiring high-quality images of distinctive fingerprint ridges and minutiae is

complicated task.

  People with no or few minutia points (surgeons as they often wash their hands with

strong detergents, builders, people with special skin conditions) cannot enroll or use the

system. 

  The number of minutia points can be a limiting factor for security of the algorithm.Results can also be confused by false minutia points (areas of obfuscation that appear

due to low-quality enrollment, imaging, or fingerprint ridge detail). 

Palm Vein Identification Solution

The pattern of blood veins is unique to every individual, even among identical twins. Palms

have a broad and complicated vascular pattern and thus contain a wealth of differentiating

features for personal identification. Furthermore, it will not vary during the person's lifetime.

It is a very secure method of authentication because this blood vein pattern lies under the skin.

This makes it almost impossible for others to read or copy.

  An individual's vein pattern image is captured by radiating his/her hand with near-

infrared rays.

  The reflection method illuminates the palm using an infrared ray and captures the light 

given off by the region after diffusion through the palm.

  The deoxidized hemoglobin in the in the vein vessels absorbs the infrared ray, thereby

reducing the reflection rate and causing the veins to appear as a black pattern. This veinpattern is then verified against a preregistered pattern to authenticate the individual.

As veins are internal in the body and have a wealth of differentiating features, attempts to forge

an identity are extremely difficult, thereby enabling a high level of security.

Page 9: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 9/13

TechMatrix 2009

9 | P a g e  

In addition, the sensor of the palm vein device can only recognize the pattern if the deoxidized

hemoglobin is actively flowing within the individual's veins.

“In addition, the Palm Vein Identification Solution is an efficient and reliable application; while

being very cost-effective to aid the user’s consideration.”  

This system is not dangerous; a near infrared is a component of sunlight: there is no more

exposure when scanning the hand than by walking outside in the sun.

Page 10: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 10/13

TechMatrix 2009

10 | P a g e  

The Need of the Hour -  An Optimal Solution 

We aim to empower our clients by providing a highly reliable and consistent biometric

authentication system based on Palm Vein pattern Recognition technology . This application

features industry-leading authentication accuracy with extremely low false rates, and the non-

intrusive and contactless integrated reader device provides ease of use with virtually no

physiological restriction for all users.

This application is a logical solution for those situations where identification and access control is

critical. As this innovative technology is difficult to forge and highly secure, the application is

provided with an extra layer of necessary protection while ensuring an easy user interface suitable

for the work environment. 

Page 11: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 11/13

TechMatrix 2009

11 | P a g e  

PRACTICAL APPLICATIONS OF PALM VEIN BIOMETRICS 

  Security systems: physical admission into secured areas with door lock and integrated

building security systems

  Log-in control : network or PC access

  Healthcare: ID verification for medical equipment, electronic record management 

  Banking and financial services: access to ATM, kiosks etc.

BENEFITS OF THE PALM-VEIN BIOMETRICS 

The users of the application will reap vast benefits with this application as not only they will

guarantee total safety of their critical data; they will also enjoy unprecedented control management 

over it.

Our clients are empowered to gain a significant advantage over their competitors owing to the

efficient access control and identification system; thus ensuring much better management of their

critical data.

The application brings about revolutionary changes for our users:

  Improved services through enhancement of secured information sharing capabilities

  Reduced organizational expenses and administrative tasks

  Assistance with combating fraudulent activities

  Easily integrated with existing software

  Difficult to forge

  Contactless, hygienic and non-invasive

  Highly accurate

  Capable of 1:1 and 1:many matching

  Non-invasive, contactless and highly accurate biometric technology 

"Healthcare organizations, government agencies, financial institutions and many other global 

enterprises, rely on Palm Secure as a cost-effective, highly accurate authentication solution" 

Page 12: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 12/13

TechMatrix 2009

12 | P a g e  

Let Us Assist You - Costing Analysis

Page 13: Tech Matrix Palm Information

8/3/2019 Tech Matrix Palm Information

http://slidepdf.com/reader/full/tech-matrix-palm-information 13/13

TechMatrix 2009

13 | P a g e  

Tech Support Specifications

We ensure our clients extended support and maintenance as per the following norms:

  Technical Support after Warranty and change request can be considered as actual as per the

requirement (Using Effort Estimation).

  Integration with other technology (i.e. Smart Card, Door Closer Technology, etc.) will be

charged as actual of effort estimation.