Identica Vascular Biometrics

3,613 views

Published on

Vascular Biometrics Security Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
3,613
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identica Vascular Biometrics

  1. 1. VP-II X Hand Vascular Pattern Recognition (HVPR) Presented by Ayal Vogel Executive Vice President of Global Sales Identica Holdings Corporation July 30, 2009 www.identicacorp.com
  2. 2. VP-II X Specification Overview VP-II X is a biometric scanner which verifies users individually unique vascular patterns extracted from the hypoderm below the surface of the skin of the back of the hand using an infra-red based sensor device. | Utilized Technology: HVPR (Hand Vascular Pattern Recognition) | Usability: 99.98% | Accuracy: FAR: 0.0001%, FRR: 0.1% | Verification Speed: 0.4 sec / person <ul><li>| Hardware Overview </li></ul><ul><ul><li>Dual CPUs (400MHz DSP, 180Mhz ARM Processor) </li></ul></ul><ul><ul><li>65K Color 2.8” TFT LCD / 16 Keys / IR Sensor / Speaker </li></ul></ul><ul><ul><li>TCP/IP Ethernet, Wiegand In/Out, Serial ports, Digital I/O, USB 2.0 </li></ul></ul><ul><ul><li>512MByte NAND Flash Memory (Up to 50,000 users and 500,000 logs) </li></ul></ul><ul><ul><li>Built-in card reader module & antenna (125Khz Prox. card / 13.5Mhz Smart card) </li></ul></ul>
  3. 3. Raw Image Extracted Vascular Pattern Hand vascular extracting processing flow Binary image <ul><li>Advantages of Hand Vascular Pattern </li></ul><ul><li>Uniqueness - Even twins’ hands are different </li></ul><ul><li>Stability - No changes over long period </li></ul><ul><li>Excellent accuracy over long period </li></ul><ul><li>Large scale features - High performance even with scars and contamination </li></ul><ul><li>Advantages of VP-II X </li></ul><ul><li>HCD (Human Criteria Decision) algorithm </li></ul><ul><li>Vascular Pattern not visible – Eliminate spoofing </li></ul><ul><li>Harsh environmental robustness </li></ul><ul><li>User privacy protected </li></ul><ul><li>Excellent user perception and convenience </li></ul>Vascular Biometrics Adaptive algorithm Noise removal algorithm
  4. 4. <ul><li>Advantages over finger scanners </li></ul><ul><ul><li>Better usability </li></ul></ul><ul><ul><li>: 5% of adults can’t use finger scanners </li></ul></ul><ul><ul><li>More robust to environment </li></ul></ul><ul><ul><li>: Contamination, Humidity </li></ul></ul><ul><ul><li>More secure against forgery </li></ul></ul><ul><ul><li>: Spoofing, Copy of residuals </li></ul></ul><ul><ul><li>Better accuracy </li></ul></ul><ul><ul><li>Sensor cleaning not required </li></ul></ul><ul><ul><li>: No physical contact to the sensor </li></ul></ul><ul><ul><li>More robust to physical feature damage </li></ul></ul><ul><ul><li>: Scars, wear </li></ul></ul><ul><ul><li>No privacy concerns to the users </li></ul></ul>Technology comparison Biometrics Technology Comparison Technology VP-II HVPR Fingerprint Hand Geometry IRIS Advantages/Disadvantages √ Non-contacting Sensor √ High Usability & Accuracy √ Non-Intrusive/User Privacy √ Small size applications X Low Usability X Difficulty in use with a physical damages like scars. √ High Usability X Low Accuracy (High FAR) X Hygienic problem by physical contact √ High Accuracy X Difficulty in use with small eyes like oriental users. X User inconvenient by eye positioning (intrusive)
  5. 5. <ul><li>Performance </li></ul><ul><li>Usability </li></ul><ul><li>Accuracy – FAR / FRR </li></ul><ul><li>Enrollment / Verification Speed (throughput) </li></ul><ul><li>Robust </li></ul><ul><li>Poor environment - contamination / humidity </li></ul><ul><li>Physical feature damages – scars / wear </li></ul><ul><li>Ease of setup and maintenance </li></ul><ul><li>User convenience </li></ul><ul><li>User perception </li></ul><ul><li>Hygiene problems </li></ul><ul><li>Non-invasive </li></ul><ul><li>Easy to use </li></ul><ul><li>Integrated networking </li></ul><ul><li>User Interface and management </li></ul><ul><li>No privacy concerns </li></ul>General Factors in Choosing biometrics <ul><li>Useable for whole population (user group) </li></ul><ul><ul><li>It is known that more than 5% of the adult population cannot use fingerprint systems. This is mainly due to the absence or weakness of their fingerprints. About 2% of people do not have proper fingerprints, and many people who use their hands intensively for work generate a very weak signal to fingerprint scanners. The VP-II provides 99.98% usability, which means almost all of the general population can use the system without any problems. </li></ul></ul><ul><li>Does not leave a trace of residual features after use </li></ul><ul><ul><li>If a biometric system leaves residual features after physical contact, the features would be easily duplicated and/or forged. It is known that fraudulent fingerprints can be easily made by the residual fingerprint on the surface of the sensor. </li></ul></ul><ul><li>Be able to reject non-human features from enrollment </li></ul><ul><ul><li>Non-human features should not be allowed to be enrolled by a biometric, for it to be considered a true biometric system. VP-II recognizes non-human features at enrollment. </li></ul></ul>Biometric systems should be: Biometrics Systems
  6. 6. VP-II X Functions <ul><li>| Basic functions </li></ul><ul><li>Administration </li></ul><ul><ul><li>Test Mode – Factory set to allow an installer to setup the system initially </li></ul></ul><ul><ul><li>Managers – Administrator, Enroll/Delete users, System setup </li></ul></ul><ul><li>Enrollment / Verification </li></ul><ul><ul><li>Users can be enrolled with a PIN, Proximity card or Smart card </li></ul></ul><ul><ul><li>HID iCLASS, Mifare, DESFire, PIV, TWIC cards supported (Built-in card reader) </li></ul></ul><ul><ul><li>Password or Bypass users can be assigned (Without verifying vascular patterns) </li></ul></ul><ul><ul><li>Up to 50,000 users supported </li></ul></ul><ul><ul><li>Up to 2 templates per user allowed, i.e., Right and Left hand </li></ul></ul><ul><li>Event & Logs </li></ul><ul><ul><li>Stores up to 500,000 access events and system logs </li></ul></ul><ul><li>Time and attendance </li></ul><ul><ul><li>4 function keys – Programmable for attendance, leave, job transfer, etc </li></ul></ul><ul><ul><li>Customized firmware to be provided for high-level time and attendance solutions </li></ul></ul><ul><li>Firmware field upgrade </li></ul>
  7. 7. VP-II X Functions <ul><li>| Networking </li></ul><ul><li>TCP/IP network (10/100 Mbps Ethernet) </li></ul><ul><ul><li>DHCP or Static IP supported </li></ul></ul><ul><ul><li>Each VP-II X stores all user information (timezone, access area, etc) in internal memory along with vascular data – Can fully function when network is not connected. </li></ul></ul><ul><li>IONcontrol-X (Server Application Software) </li></ul><ul><ul><li>Provides access control and time & attendance functions </li></ul></ul><ul><ul><li>VP-II X can run with or without IONcontrol-X </li></ul></ul><ul><li>Database Management </li></ul><ul><ul><li>Master/Slave operation – All user data is automatically distributed by the Master VP-II X to all Slaves in the network </li></ul></ul><ul><ul><li>Database backup and recovery function by network or by using USB memory port </li></ul></ul>
  8. 8. VP-II X Functions <ul><li>| Access control functions </li></ul><ul><li>Timezone and Access area control </li></ul><ul><ul><li>Up to 200 timezone/holiday tables </li></ul></ul><ul><ul><li>Timezone and/or Access area control per users and/or units </li></ul></ul><ul><li>Relay output, Door status monitoring, Remote open, Exit button </li></ul><ul><li>Automatic door release when a fire-alarm detected (Optional by a digital input port) </li></ul><ul><li>Electric door lock controller VP-II XG (Optional) </li></ul><ul><ul><li>A separate controller (VP-II XG) to be installed at a secure place (inside the door) </li></ul></ul><ul><ul><li>Serial communication between X and XG (Optional use of RS485) </li></ul></ul>
  9. 9. VP-II X Functions <ul><li>| Access control functions </li></ul><ul><li>Interface to an ACU (Access Control Unit) </li></ul><ul><ul><li>Up to 128bit Wiegand output to PACS </li></ul></ul><ul><ul><li>Digital In/Out ports </li></ul></ul><ul><ul><li>Clock & Data output (Optional) </li></ul></ul><ul><li>Interface to internal/external card readers (CR) </li></ul><ul><ul><li>Up to 128bit Wiegand input from an existing external card reader </li></ul></ul><ul><ul><li>Clock & Data input for Magnetic card reader </li></ul></ul><ul><ul><li>Optional built in Card Readers: 125 MHz Prox, Smart Card Readers including: iCLASS, Mifare, DESFire, PIV, TWIC </li></ul></ul><ul><li>Tamper-proof </li></ul><ul><ul><li>Security screw applied </li></ul></ul><ul><ul><li>Tamper switch installed on the rear cover – Alarm and/or report to a server </li></ul></ul>
  10. 10. VP-II X Functions | User interface <ul><li>Display and Keypad </li></ul><ul><ul><li>User friendly GUI with color TFT LCD </li></ul></ul><ul><ul><li>Multi-language capability </li></ul></ul><ul><ul><li>Programmable function keys, Keypad enable/disable function </li></ul></ul><ul><ul><li>Backlight for keypad and LCD </li></ul></ul><ul><li>Other </li></ul><ul><ul><li>Adjustable sound/beep </li></ul></ul><ul><ul><li>User detection with an IR sensor </li></ul></ul><ul><ul><li>RTC (Real Time Clock), Time/Date synchronization with a time-server </li></ul></ul><ul><li>Logo replacement </li></ul><ul><ul><li>Customized logo offered upon business agreement </li></ul></ul>
  11. 11. VP-II X/VP-II S Comparison | Improved Biometric Performance <ul><li>No light interference from 0 to 20,000 LUX, unlike limited range of other biometric modalities </li></ul><ul><li>Widened hand viewing area – Extracts more vascular features </li></ul><ul><li>Less sensitivity in positioning hand  Minimize user training effort  Lower FRR </li></ul><ul><li>| Controller Built-in Scanner </li></ul><ul><li>Card module & Antenna (125Khz/13.56Mhz) built-in </li></ul><ul><ul><li>HID MCM module for Proximity / OEM50 module for iCLASS </li></ul></ul><ul><ul><li>GemProx module for Mifare, DESfire, TWIC and PIV </li></ul></ul><ul><li>Controller functions </li></ul><ul><ul><li>Internal database memory up to 50,000 users DB and 500,000 events/logs </li></ul></ul><ul><ul><li>Direct network communications between VP-II X units and/or Server via TCP/IP </li></ul></ul><ul><li>Simplified configuration & Easier installation </li></ul>Enhanced Sensor Two templates per user Improved Algorithm
  12. 12. VP-II X/VP-II S Comparison (Cont.) <ul><li>| Upgraded functions </li></ul><ul><li>External interface capability </li></ul><ul><ul><li>Extended PIN digits (From 8 to 24) </li></ul></ul><ul><ul><li>Extended Wiegand in/out bits (From 48 to 128bit) </li></ul></ul><ul><ul><li>Clock & Data interface added </li></ul></ul><ul><li>Strong time and attendance capability </li></ul><ul><ul><li>2.8” color TFT LCD for interactive user interface </li></ul></ul><ul><ul><li>Programmable 4 functions keys for time and attendance use </li></ul></ul><ul><li>Tamper-proof </li></ul><ul><li>OEM Capability </li></ul><ul><ul><li>Customer logo can be applied </li></ul></ul><ul><ul><li>Flexible firmware customization </li></ul></ul>

×