1 / 19

Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world

Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world. Pierpaolo Murrieri, PhD Project Manager. Biometrics.

gazit
Download Presentation

Italdata Ingegneria dell’Idea Biometrics, an effective tool in the Justice world

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Italdata Ingegneria dell’IdeaBiometrics, an effective tool in the Justice world Pierpaolo Murrieri, PhD Project Manager

  2. Biometrics Biometrics (from the ancient Greek bios, or life, and metros, or measurement) embraces a series of techniques to ascertain the identify of individuals by ”decoding” their morphological features. 3.700.000 B.C. 19-th Century Today

  3. Biometrics – A Growing Interest • Today, the need for biometric solutions is growing at international, state and local government level for • Defense and administration applications • Security infrastructure for business networks • Government applications (i.e. criminal investigation, territorial control, electronic documents) • Protection of financial transactions in the banking sector • Security of critical environment (i.e. Gas and Oil plants, airports)

  4. Biometrics Solutions • Many different methods of biometric identification: • Face and facial thermograph • Iris and retina recognition • Palm geometry and veins • Voice recognition • Signature matching • The most widely adopted, simple to use and reliable technology is digital fingerprint recognition, which has the longest history of proven effectiveness in criminal investigations.

  5. Criminal investigation • Criminal investigation is the most inbred field of application for fingerprint identification. • Police departments commonly use AFIS (Automated Fingerprint Identification Systems) and APFIS (Automated Palmprints and Fingerprints Identification Systems) in order to identify criminals from their latent fingerprints. • There are huge databases of fingerprints and palm prints: • Criminal • Civil

  6. Chile – A case study • Chile is one of the country that mostly use fingeprints for Justice applications. • 4 AFIS • Carabineros de Cile (Criminal, Italdata) • Polizia Investigativa (Criminal, Italdata) • Gendarmeria de Chile (Criminal, Italdata) • Registro Civil (Civil) • Criminal AFIS used • during the investigation process • manage entrance/exit of convicts from Jail.

  7. Integrations - Carabineros • PSS (mobile unit for territorial control) to Carabineros de Cile • Verification processes • Identification processes • License plate reading + RUT AFIS Registro Civil AFIS Carabineros License Plates Hotlist Search Verify Search Result Verification Result

  8. Jail Management System –Gendarmeria de Cile • Objective of the system is that to allow the univocal identification of prisoners, using the fingerprint identification technology, in order to execute identity checks during entry and exit phases of prisoners from any Penalty Units, maintaining trace of each transaction during the time.

  9. JMS – Workflow Enrollment The prisoner is conducted to the Penalty Unity Biometric Data are acquired A search is launched Inside the existing AFIS Data Base AFIS Data Base Search Search Results and Old or New Unic ID code Unic ID Code

  10. JMS – Workflow Prisoner Exit The List of Prisoners That should exit every day Is Biometrically Checked in few seconds 1 to n The Identity Check is OK? NO No Exit Allowed! Search Search Results Unic ID Code YES Log of transaction results and “status” update inside the Jail Management System DB AFIS Data Base Jail Management System Data Base (JMS)

  11. JMS – Workflow Prisoner Entry The Prisoner’s Identity Is Biometrically Checked in few seconds 1 to n The Identity Check is OK? Specific related Activities needed in order to properly manage the case NO Search Search results Unic ID Code YES Log of transaction results and “status” update inside the Jail Management System DB AFIS Data Base Jail Management System Data Base (JMS)

  12. Electronic Surveillance • Judges, law and penitentiary authorities assign punishments for offenders in accordance with their own legal regulations. Depending on the specific case, some (typically short) penalties may be executed out of the jails. • In general, dealing with convicts who are not in jail entails: • more costs in human resources (police officers or surveillance entities) in order to observe them (need = optimize control processes); • lower levels of security (need = continuous and uninterrupted control). • To answer to these needs, Italdata has developed new electronic surveillance tools, by which it is possible to automatically and continuously monitor convicts subject to both perimeter and tracking constraints.

  13. ESS • The ESSII (Electronic Surveillance System) and ESSI&O (Electronic Surveillance System Indoor & Outdoor) are electronic systems that are devoted to support surveillance entities in the process of controlling prisoners under house arrest or in limited freedom. • In addition to a constant monitoring of the person’s presence within the designated area, it notifies the surveillance authorities all anomalous events issuing alarm messages in case of lock tampering or escape.

  14. ESS Components The system is composed of: • A transmitter, the “electronic bracelet” It’s the mobile component of the control device and it’s fitted around the subject’s ankle. • A fixed or a mobile receiving station, the “base” It’s the area localizer device. It’s installed in the house of the subject under control or can be carried out. It receives data from the transmitter and exchange information or alarms respect the remote operation center through a fixed or GSM the telephone line or through a GPRS or ADSL connection (in the fixed configuration). • An “operation center” Responsible of remote system configuration, polling and alarms or events handling.

  15. Logical Accesses – An improvement to security • Personal data (username, password, personal certificates ) can be stored on the smart card and protected by fingerprint recognition. • The ID-Pocket device is designed to provide access to information systems using cryptographic smart cards and PIN-free user biometric recognition tecniques. • The entire identification process is managed by ID-Pocket and no biometric data is exchanged or stored in a database nor in the personal computer neither in a remote server. (MOD – Match On Device technology)

  16. ID-Pocket • Through a previous enrollment the biometric data are stored on a Smart Card. • All the data stored on the card will only be accessible through the device. • The biometric data will be ONLY stored in the smart card that is owned by the user, there is no “privacy” concern. • The authentication process can be performed by using a PKI (Public Key Infrastructure) or by storing personal information in the card.

  17. Overall view Justice PSS AFIS JMS ESS Investigation Penalty ID-POCKET ICT

  18. Thank You! Pierpaolo Murrieri, PhD Italdata Ingegneria dell’Idea Viale Eroi di Cefalonia, 123 00128 Rome (Italy) Phone: +39 06 50797837 Email: pierpaolo.murrieri@italdata-roma.com

  19. Templates • Minutiae, basic information extracted from a fingerprint: • Ridge ending • Bifurcations • Fingerprint patterns • Arches • Loops • Whorls

More Related