Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world Pierpaolo...

19
Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world Pierpaolo Murrieri, PhD Project Manager

Transcript of Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world Pierpaolo...

Italdata Ingegneria dell’IdeaBiometrics, an effective tool in

the Justice world

Pierpaolo Murrieri, PhDProject Manager

Biometrics

Biometrics (from the ancient Greek bios, or life, and metros, or measurement) embraces a series of techniques to ascertain the identify of individuals by ”decoding” their morphological features.

3.700.000 B.C. 19-th Century Today

Biometrics – A Growing Interest

• Today, the need for biometric solutions is growing at international, state and local government level for– Defense and administration applications

– Security infrastructure for business networks

– Government applications (i.e. criminal investigation, territorial control, electronic documents)

– Protection of financial transactions in the banking sector

– Security of critical environment (i.e. Gas and Oil plants, airports)

Biometrics Solutions

• Many different methods of biometric identification: – Face and facial thermograph– Iris and retina recognition– Palm geometry and veins– Voice recognition– Signature matching

• The most widely adopted, simple to use and reliable technology is digital fingerprint recognition, which has the longest history of proven effectiveness in criminal investigations.

Criminal investigation

• Criminal investigation is the most inbred field of application for fingerprint identification.

• Police departments commonly use AFIS (Automated Fingerprint Identification Systems) and APFIS (Automated Palmprints and Fingerprints Identification Systems) in order to identify criminals from their latent fingerprints.

• There are huge databases of fingerprints and palm prints:– Criminal– Civil

Chile – A case study

• Chile is one of the country that mostly use fingeprints for Justice applications.

• 4 AFIS– Carabineros de Cile (Criminal, Italdata)

– Polizia Investigativa (Criminal, Italdata)

– Gendarmeria de Chile (Criminal, Italdata)

– Registro Civil (Civil)

• Criminal AFIS used – during the investigation process

– manage entrance/exit of convicts from Jail.

Integrations - Carabineros

• PSS (mobile unit for territorial control) to Carabineros de Cile– Verification processes

– Identification processes

– License plate reading

AFISRegistro

CivilSearch Result

SearchVerify

Verification Result

AFISCarabineros

LicensePlatesHotlist

+ RUT

Jail Management System –Gendarmeria de Cile

• Objective of the system is that to allow the univocal identification of prisoners, using the fingerprint identification technology, in order to execute identity checks during entry and exit phases of prisoners from any Penalty Units, maintaining trace of each transaction during the time.

JMS – Workflow Enrollment

The prisoner is conducted to the

Penalty Unity

Biometric Dataare acquired

SearchA search is launched

Inside the existingAFIS Data BaseSearch Results and Old or New Unic ID code

AFIS Data Base

Unic ID Code

JMS – Workflow Prisoner Exit

The List of PrisonersThat should exit every day

Is BiometricallyChecked in few seconds

1 to n

The IdentityCheck is

OK? Se

arc

h

Se

arc

h R

es

ult

s

AFIS Data Base

YES

NO

Log of transaction resultsand “status” update inside theJail Management System DB

No Exit Allowed!

Jail ManagementSystem Data Base

(JMS)

Un

ic ID

Co

de

JMS – Workflow Prisoner Entry

The Prisoner’s IdentityIs Biometrically

Checked in few seconds1 to n

The IdentityCheck is

OK? Se

arc

h

Se

arc

h r

es

ult

s

AFIS Data Base

YES

NO

Log of transaction resultsand “status” update inside theJail Management System DB

Specific related Activities needed in

order to properly manage the case

Jail ManagementSystem Data Base

(JMS)

Un

ic ID

Co

de

Electronic Surveillance

• Judges, law and penitentiary authorities assign punishments for offenders in accordance with their own legal regulations. Depending on the specific case, some (typically short) penalties may be executed out of the jails.

• In general, dealing with convicts who are not in jail entails:– more costs in human resources (police officers or surveillance

entities) in order to observe them (need = optimize control processes);

– lower levels of security (need = continuous and uninterrupted control).

• To answer to these needs, Italdata has developed new electronic surveillance tools, by which it is possible to automatically and continuously monitor convicts subject to both perimeter and tracking constraints.

ESS

• The ESSII (Electronic Surveillance System) and ESSI&O (Electronic Surveillance System Indoor & Outdoor) are electronic systems that are devoted to support surveillance entities in the process of controlling prisoners under house arrest or in limited freedom.

• In addition to a constant monitoring of the person’s presence within the designated area, it notifies the surveillance authorities all anomalous events issuing alarm messages in case of lock tampering or escape.

ESS Components

The system is composed of:

• A transmitter, the “electronic bracelet”It’s the mobile component of the control device and it’s fitted around the

subject’s ankle.

• A fixed or a mobile receiving station, the “base”It’s the area localizer device. It’s installed in the house of the subject under

control or can be carried out. It receives data from the transmitter and exchange information or alarms respect the remote operation center through a fixed or GSM the telephone line or through a GPRS or ADSL connection (in the fixed configuration).

• An “operation center”Responsible of remote system configuration, polling and alarms or events

handling.

Logical Accesses – An improvement to security

• Personal data (username, password, personal certificates ) can be stored on the smart card and protected by fingerprint recognition.

• The ID-Pocket device is designed to provide access to information systems using cryptographic smart cards and PIN-free user biometric recognition tecniques.

• The entire identification process is managed by ID-Pocket and no biometric data is exchanged or stored in a database nor in the personal computer neither in a remote server. (MOD – Match On Device technology)

ID-Pocket

• Through a previous enrollment the biometric data are stored on a Smart Card.

• All the data stored on the card will only be accessible through the device.

• The biometric data will be ONLY stored in the smart card that is owned by the user, there is no “privacy” concern.

• The authentication process can be performed by using a PKI (Public Key Infrastructure) or by storing personal information in the card.

Overall view

Justice

Investigation

PSSAFIS

Penalty

JMSESS

ICT

ID-POCKET

Thank You!

Pierpaolo Murrieri, PhD

Italdata Ingegneria dell’Idea

Viale Eroi di Cefalonia, 123

00128 Rome (Italy)

Phone: +39 06 50797837

Email: [email protected]

Templates

• Minutiae, basic information extracted from a fingerprint:– Ridge ending– Bifurcations

• Fingerprint patterns – Arches– Loops– Whorls