Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world Pierpaolo...
-
Upload
benjamin-booth -
Category
Documents
-
view
217 -
download
1
Transcript of Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world Pierpaolo...
Italdata Ingegneria dell’IdeaBiometrics, an effective tool in
the Justice world
Pierpaolo Murrieri, PhDProject Manager
Biometrics
Biometrics (from the ancient Greek bios, or life, and metros, or measurement) embraces a series of techniques to ascertain the identify of individuals by ”decoding” their morphological features.
3.700.000 B.C. 19-th Century Today
Biometrics – A Growing Interest
• Today, the need for biometric solutions is growing at international, state and local government level for– Defense and administration applications
– Security infrastructure for business networks
– Government applications (i.e. criminal investigation, territorial control, electronic documents)
– Protection of financial transactions in the banking sector
– Security of critical environment (i.e. Gas and Oil plants, airports)
Biometrics Solutions
• Many different methods of biometric identification: – Face and facial thermograph– Iris and retina recognition– Palm geometry and veins– Voice recognition– Signature matching
• The most widely adopted, simple to use and reliable technology is digital fingerprint recognition, which has the longest history of proven effectiveness in criminal investigations.
Criminal investigation
• Criminal investigation is the most inbred field of application for fingerprint identification.
• Police departments commonly use AFIS (Automated Fingerprint Identification Systems) and APFIS (Automated Palmprints and Fingerprints Identification Systems) in order to identify criminals from their latent fingerprints.
• There are huge databases of fingerprints and palm prints:– Criminal– Civil
Chile – A case study
• Chile is one of the country that mostly use fingeprints for Justice applications.
• 4 AFIS– Carabineros de Cile (Criminal, Italdata)
– Polizia Investigativa (Criminal, Italdata)
– Gendarmeria de Chile (Criminal, Italdata)
– Registro Civil (Civil)
• Criminal AFIS used – during the investigation process
– manage entrance/exit of convicts from Jail.
Integrations - Carabineros
• PSS (mobile unit for territorial control) to Carabineros de Cile– Verification processes
– Identification processes
– License plate reading
AFISRegistro
CivilSearch Result
SearchVerify
Verification Result
AFISCarabineros
LicensePlatesHotlist
+ RUT
Jail Management System –Gendarmeria de Cile
• Objective of the system is that to allow the univocal identification of prisoners, using the fingerprint identification technology, in order to execute identity checks during entry and exit phases of prisoners from any Penalty Units, maintaining trace of each transaction during the time.
JMS – Workflow Enrollment
The prisoner is conducted to the
Penalty Unity
Biometric Dataare acquired
SearchA search is launched
Inside the existingAFIS Data BaseSearch Results and Old or New Unic ID code
AFIS Data Base
Unic ID Code
JMS – Workflow Prisoner Exit
The List of PrisonersThat should exit every day
Is BiometricallyChecked in few seconds
1 to n
The IdentityCheck is
OK? Se
arc
h
Se
arc
h R
es
ult
s
AFIS Data Base
YES
NO
Log of transaction resultsand “status” update inside theJail Management System DB
No Exit Allowed!
Jail ManagementSystem Data Base
(JMS)
Un
ic ID
Co
de
JMS – Workflow Prisoner Entry
The Prisoner’s IdentityIs Biometrically
Checked in few seconds1 to n
The IdentityCheck is
OK? Se
arc
h
Se
arc
h r
es
ult
s
AFIS Data Base
YES
NO
Log of transaction resultsand “status” update inside theJail Management System DB
Specific related Activities needed in
order to properly manage the case
Jail ManagementSystem Data Base
(JMS)
Un
ic ID
Co
de
Electronic Surveillance
• Judges, law and penitentiary authorities assign punishments for offenders in accordance with their own legal regulations. Depending on the specific case, some (typically short) penalties may be executed out of the jails.
• In general, dealing with convicts who are not in jail entails:– more costs in human resources (police officers or surveillance
entities) in order to observe them (need = optimize control processes);
– lower levels of security (need = continuous and uninterrupted control).
• To answer to these needs, Italdata has developed new electronic surveillance tools, by which it is possible to automatically and continuously monitor convicts subject to both perimeter and tracking constraints.
ESS
• The ESSII (Electronic Surveillance System) and ESSI&O (Electronic Surveillance System Indoor & Outdoor) are electronic systems that are devoted to support surveillance entities in the process of controlling prisoners under house arrest or in limited freedom.
• In addition to a constant monitoring of the person’s presence within the designated area, it notifies the surveillance authorities all anomalous events issuing alarm messages in case of lock tampering or escape.
ESS Components
The system is composed of:
• A transmitter, the “electronic bracelet”It’s the mobile component of the control device and it’s fitted around the
subject’s ankle.
• A fixed or a mobile receiving station, the “base”It’s the area localizer device. It’s installed in the house of the subject under
control or can be carried out. It receives data from the transmitter and exchange information or alarms respect the remote operation center through a fixed or GSM the telephone line or through a GPRS or ADSL connection (in the fixed configuration).
• An “operation center”Responsible of remote system configuration, polling and alarms or events
handling.
Logical Accesses – An improvement to security
• Personal data (username, password, personal certificates ) can be stored on the smart card and protected by fingerprint recognition.
• The ID-Pocket device is designed to provide access to information systems using cryptographic smart cards and PIN-free user biometric recognition tecniques.
• The entire identification process is managed by ID-Pocket and no biometric data is exchanged or stored in a database nor in the personal computer neither in a remote server. (MOD – Match On Device technology)
ID-Pocket
• Through a previous enrollment the biometric data are stored on a Smart Card.
• All the data stored on the card will only be accessible through the device.
• The biometric data will be ONLY stored in the smart card that is owned by the user, there is no “privacy” concern.
• The authentication process can be performed by using a PKI (Public Key Infrastructure) or by storing personal information in the card.
Thank You!
Pierpaolo Murrieri, PhD
Italdata Ingegneria dell’Idea
Viale Eroi di Cefalonia, 123
00128 Rome (Italy)
Phone: +39 06 50797837
Email: [email protected]
Templates
• Minutiae, basic information extracted from a fingerprint:– Ridge ending– Bifurcations
• Fingerprint patterns – Arches– Loops– Whorls