SlideShare a Scribd company logo
1 of 1
Download to read offline
471-2F2 Biometrics and E-Authentication - ELLIOTT – IAP




         Biometric Credentialing for Natural Disasters
                                                                        S. J. Elliott, Ph. D., & M. Niang
                                Biometric Standards, Performance, & Assurance Laboratory
                        Department of Industrial Technology, College of Technology, Purdue University
               Motivation                                                                              Proposed Solution
               The catastrophic chain of events that transpired during Hurricane Katrina               The proposed system introduces a personal digital assistant (PDA) device
               concerning the humanitarian response brought to light the need for a mobile             equipped with an Iris SDi Imager. This device would be used in the field to identify
               credentialing system.                                                                   / verify personnel for the identified constituencies. The system would offer a
                                                                                                       mobile system that is practical, affordable, and self-sustaining.
                     •To provide federal, relief, and non-governmental organizations a proactive and
                     reliable system for the credentialing of personnel
                     •To identify afflicted persons for relocation and repatriation purposes
                     •To deter and prevent fraudulent requests for repeated claims of humanitarian
                     assistance
                     •To promote biometric use for homeland security and increase public awareness
                     •To provide portability for iris recognition                                                                                          Central Data
                                                                                                                                                            Repository




                                                                                                                                                                           User
                                                                                                                                            User




                                                                                                       Conceptual Flow Chart




               Impact
               To propose a credentialing emergency response management tool for use during
               natural disasters by the following constituencies:

                     •Department of Homeland Security
                        •Federal Emergency Management Agency
                     •Relief and charity organizations
                        •International / American Red Cross
                     •United Nations High Commission for Refugees
                        •Aid distribution in developing nations
                     •Law Enforcement
                                                                                                       Federal Initiative
                                                                                                       The proposed credentialing system is consistent with the Homeland Security
                                                                                                       Presidential Directive – 12 for a need of a common verification means for federal
                                                                                                       personnel and encompasses four objectives outlined by the DHS’s Six-Point
                                                                                                       Agenda:

                                                                                                         •Increase overall preparedness for catastrophic events,
                                                                                                         •Create better security system to move people more securely and efficiently,
                                                                                                         •Enhance information sharing,
                                                                                                         •Promote procurement of information technology

                                                                                                       Purdue:

                                                                                                         •Department of Industrial Technology

More Related Content

Viewers also liked

Young professional tbv Hoofdredacteuren Reed Business
Young professional tbv Hoofdredacteuren Reed BusinessYoung professional tbv Hoofdredacteuren Reed Business
Young professional tbv Hoofdredacteuren Reed BusinessMedia Plaza
 
Referendo local cne_orçamento
Referendo local cne_orçamentoReferendo local cne_orçamento
Referendo local cne_orçamentopedroribeiro1973
 
Web américa economía
Web américa economíaWeb américa economía
Web américa economíaPerú 2021
 
Sneak Preview Nieuwbouw Media Plaza Utrecht
Sneak Preview Nieuwbouw Media Plaza UtrechtSneak Preview Nieuwbouw Media Plaza Utrecht
Sneak Preview Nieuwbouw Media Plaza UtrechtMedia Plaza
 
Entrevista sobre sostenibilidad
Entrevista sobre sostenibilidadEntrevista sobre sostenibilidad
Entrevista sobre sostenibilidadAmarilis mw
 

Viewers also liked (8)

N°9 p3
N°9 p3N°9 p3
N°9 p3
 
St[1].patrick s day
St[1].patrick s daySt[1].patrick s day
St[1].patrick s day
 
Young professional tbv Hoofdredacteuren Reed Business
Young professional tbv Hoofdredacteuren Reed BusinessYoung professional tbv Hoofdredacteuren Reed Business
Young professional tbv Hoofdredacteuren Reed Business
 
Referendo local cne_orçamento
Referendo local cne_orçamentoReferendo local cne_orçamento
Referendo local cne_orçamento
 
Web américa economía
Web américa economíaWeb américa economía
Web américa economía
 
Sneak Preview Nieuwbouw Media Plaza Utrecht
Sneak Preview Nieuwbouw Media Plaza UtrechtSneak Preview Nieuwbouw Media Plaza Utrecht
Sneak Preview Nieuwbouw Media Plaza Utrecht
 
Varicella
VaricellaVaricella
Varicella
 
Entrevista sobre sostenibilidad
Entrevista sobre sostenibilidadEntrevista sobre sostenibilidad
Entrevista sobre sostenibilidad
 

Similar to (2006) Biometric Credentialing for Natural Disasters

Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationGisli Olafsson
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through TechnologyHeather Blanchard
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ARDC
 
Safety gauge presentation
Safety gauge presentationSafety gauge presentation
Safety gauge presentationomrishafran
 
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Livingstone Advisory
 
Achieving Information Self-Sufficiency
Achieving Information Self-SufficiencyAchieving Information Self-Sufficiency
Achieving Information Self-SufficiencyCognizant
 
Emilie Robert Observatory of free healthcare in Mali 2012
Emilie Robert Observatory of free healthcare in Mali 2012Emilie Robert Observatory of free healthcare in Mali 2012
Emilie Robert Observatory of free healthcare in Mali 2012Emilie Robert
 
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docxcroysierkathey
 
Presentation
PresentationPresentation
Presentationejoffe
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 
Holistic privacy impact assessment framework for video privacy filtering tech...
Holistic privacy impact assessment framework for video privacy filtering tech...Holistic privacy impact assessment framework for video privacy filtering tech...
Holistic privacy impact assessment framework for video privacy filtering tech...sipij
 
TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012100%Open
 
Article Detail 5 - Domestic Preparedness
Article Detail 5 - Domestic PreparednessArticle Detail 5 - Domestic Preparedness
Article Detail 5 - Domestic PreparednessDiana Hopkins
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityMarie-Michelle Strah, PhD
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 

Similar to (2006) Biometric Credentialing for Natural Disasters (20)

Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Warning Development Process Article
Warning Development Process ArticleWarning Development Process Article
Warning Development Process Article
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
ANDS health and medical data webinar 16 May. Storing and Publishing Health an...
 
Safety gauge presentation
Safety gauge presentationSafety gauge presentation
Safety gauge presentation
 
Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
 
Ahier himss 2012 - direct project overview presentation
Ahier   himss 2012 - direct project overview presentationAhier   himss 2012 - direct project overview presentation
Ahier himss 2012 - direct project overview presentation
 
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
 
Achieving Information Self-Sufficiency
Achieving Information Self-SufficiencyAchieving Information Self-Sufficiency
Achieving Information Self-Sufficiency
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
Emilie Robert Observatory of free healthcare in Mali 2012
Emilie Robert Observatory of free healthcare in Mali 2012Emilie Robert Observatory of free healthcare in Mali 2012
Emilie Robert Observatory of free healthcare in Mali 2012
 
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
 
Presentation
PresentationPresentation
Presentation
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Holistic privacy impact assessment framework for video privacy filtering tech...
Holistic privacy impact assessment framework for video privacy filtering tech...Holistic privacy impact assessment framework for video privacy filtering tech...
Holistic privacy impact assessment framework for video privacy filtering tech...
 
TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012TSB_IoT_Presentations_27June2012
TSB_IoT_Presentations_27June2012
 
Article Detail 5 - Domestic Preparedness
Article Detail 5 - Domestic PreparednessArticle Detail 5 - Domestic Preparedness
Article Detail 5 - Domestic Preparedness
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and Security
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 

More from International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

More from International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

(2006) Biometric Credentialing for Natural Disasters

  • 1. 471-2F2 Biometrics and E-Authentication - ELLIOTT – IAP Biometric Credentialing for Natural Disasters S. J. Elliott, Ph. D., & M. Niang Biometric Standards, Performance, & Assurance Laboratory Department of Industrial Technology, College of Technology, Purdue University Motivation Proposed Solution The catastrophic chain of events that transpired during Hurricane Katrina The proposed system introduces a personal digital assistant (PDA) device concerning the humanitarian response brought to light the need for a mobile equipped with an Iris SDi Imager. This device would be used in the field to identify credentialing system. / verify personnel for the identified constituencies. The system would offer a mobile system that is practical, affordable, and self-sustaining. •To provide federal, relief, and non-governmental organizations a proactive and reliable system for the credentialing of personnel •To identify afflicted persons for relocation and repatriation purposes •To deter and prevent fraudulent requests for repeated claims of humanitarian assistance •To promote biometric use for homeland security and increase public awareness •To provide portability for iris recognition Central Data Repository User User Conceptual Flow Chart Impact To propose a credentialing emergency response management tool for use during natural disasters by the following constituencies: •Department of Homeland Security •Federal Emergency Management Agency •Relief and charity organizations •International / American Red Cross •United Nations High Commission for Refugees •Aid distribution in developing nations •Law Enforcement Federal Initiative The proposed credentialing system is consistent with the Homeland Security Presidential Directive – 12 for a need of a common verification means for federal personnel and encompasses four objectives outlined by the DHS’s Six-Point Agenda: •Increase overall preparedness for catastrophic events, •Create better security system to move people more securely and efficiently, •Enhance information sharing, •Promote procurement of information technology Purdue: •Department of Industrial Technology