1 / 16

VP-II X TWIC Hand Vascular Pattern Recognition System

VP-II X TWIC Hand Vascular Pattern Recognition System. TWIC Operational Biometrics. FSWG - TRTG Meeting February 26, 2013 Presented by: Terry Wheeler. www.tech-sphere.com. AGENDA. Introduction to Techsphere and its TWIC Hand Vascular Pattern Recognition (HVPR) Solution

nemo
Download Presentation

VP-II X TWIC Hand Vascular Pattern Recognition System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VP-II X TWIC Hand Vascular Pattern Recognition System TWIC Operational Biometrics FSWG - TRTG Meeting February 26, 2013 Presented by: Terry Wheeler www.tech-sphere.com

  2. AGENDA • Introduction to Techsphere and its TWIC Hand Vascular Pattern Recognition (HVPR) Solution • What is “Alternate Biometrics” • Why/How it applies to real TWIC applications in operational port environments • NetControl-TWIC Software • Connected to 3rd Party PACS Systems • NetControl-TWIC-E – Enterprise PACS Solution • Live HVPR Enrolment/Verification Demonstration • Questions

  3. The VP-II X-TWIC HVPR biometric system undeniably verifies users byutilizing a state-of-the-art recognitionalgorithm based on hand vascular patterns extracted by its infrared optical sensor system.

  4. Noise removal algorithm Adaptive algorithm Alternate “Vascular” Biometrics • Advantages of Hand Vascular Pattern • Uniqueness - Even twins’ hands are different • Stability - No changes over long period • Excellent accuracy over long period • Large scale features - High performance even with reasonably big scars and contamination • Advantages of VP-II X • HCD (Human Criteria Decision) algorithm • Invisible biometric feature – Eliminate spoofing • Harsh environmental robustness • User privacy protected • Excellent user perception and convenience Raw Image Extracted Vascular Pattern Binary image Hand vascular extracting processing flow

  5. Iris Vascular VP-II Finger Face Hand Geometry Biometric Alternatives Accuracy(FRR / FAR) Usability

  6. Technology VP-II HVPR Fingerprint Hand Shape IRIS Advantages/Disadvantages O None-contacting Sensor O High Usability & Accuracy O Small size applications X Low Usability X Difficulty in use with a physical damages like scars. O High Usability X Low Accuracy (High FAR) X Hygienic problem by physical contact O High Accuracy X Difficulty in use with small eyes like oriental users. X User inconvenient by eye positioning (intrusive) Biometrics Technology Comparison |Technology comparison |VP-II X • Performance • Usability • Accuracy – FAR / FRR • Enrollment / Verification Speed (throughput) User convenience • User perception • Hygiene problems • No invasive • Robust • Poor environment - contamination / humidity • Physical feature damages – scars / wear Easy to use • Integrated networking • User Interface and management No privacy concerns Ease of setup and maintenance

  7. Biometrics Systems General Factors in Choosing biometrics Performance • Usability • Accuracy – FAR / FRR • Enrollment / Verification Speed (throughput) Robust • Poor environment - contamination / humidity • Physical feature damages – scars / wear Ease of setup and maintenance User convenience • User perception • Hygiene problems • Non-invasive Easy to use • Integrated networking • User Interface and management No privacy concerns Biometric systems should be: • Eliminates user bottlenecks The VP-II has a biometric verification speed of 0.4 seconds. • Useable for whole population (user group) The VP-II provides 99.98% usability, which means almost all of the general population can use the system without any problems. • Does not leave a trace of residual features after use If a biometric system leaves residual features after physical contact, the features would be easily duplicated and/or forged. • Be able to reject non-human features from enrollment Non-human features should not be allowed to be enrolled by a biometric, for it to be considered a true biometric system. VP-II recognizes the most non-human features at enrollment.

  8. VP-II X TWIC Overview VP-II Xis a biometric scanner which verifies users individually unique vascular patterns extracted from the hypoderm below the surface of the skin of the back of the hand using an infra-red based sensor device. |Utilized Technology: HVPR (Hand Vascular Pattern Recognition) |Usability: 99.98% |Accuracy: FAR: 0.0001%, FRR: 0.1% |Verification Speed: 0.4 sec / person |Hardware Overview • 65K Color 2.8” TFT LCD / 16 Keys / IR Sensor / Speaker • TCP/IP Ethernet, Wiegand In/Out, Serial ports, Digital I/O, USB 2.0 • Built-in card reader module & antenna * 13.5Mhz Mifare module for TWIC cards * 125Khz Proximity card module for alternative daily operational use

  9. TWIC ICE List VP-II Listed in the TWIC ICE (Initial Capability Evaluation) List http://www.tsa.gov/assets/pdf/twic_ice_list.pdf

  10. TWIC Continuity of Trust |TWIC Card Holder Enrollment – Continuity of Trust • Integrated Codebench PIVCheck (GSA FIPS 201 & TWIC ICE Approved) • TWIC Card Validity Check (TPK, CHUID) & CCL (Cancelled Card List) Check • Card holder’s PIN and Fingerprint Verification • Vascular Data Enrollment • Accepts successfully validated TWIC card and Card holder only • Securely places encrypted vascular biometric data & CHUID in the database • A Prox. Card assigned to a TWIC card can be enrolled to be used for verification • PACS Plug-in • Card Holder’s Name, CHUID, Expiry Date, Facial image are be exported to a PACS database

  11. Verification for Access Control |Verification for Access Control – No TWIC Fingerprint reader required • CHUID only or CHUID + Vascular Biometrics • Set by the Port Authority or Automatically Determined by the MARSEC level • CCL (Cancelled Card List) and Expiration Date Checked at each verification process • Also applied when using an Optional Prox. Card (Matched to CHUID at Enrollment) • Access Grant • Wiegand Output to PACS (TWIC Standard Wiegand Format: 75 Bit) • Optional NetControl-X –TWIC-E Enterprise PACS Software with VP-II XG Door Controllers can be used for entire Access Control solution

  12. Verification for Access Control |Access Control With VP-II NetControl-X PACS Software • NetControl-X TWIC Physical Access Control • VP-II XG Door Controller to strike a door • VP-II XC Access Control Unit to add card readers |Access Control Features • Enrollment / Verification / Event / Logs • Up to 50,000 users enrolled • Up to 2 vascular templates per user allowed, i.e., Right and Left hand • Stores up to 500,000 access events and system logs • Real time monitoring – Device status, Access transactions, Events, etc • Access permission • Up to 200 timezone/holiday tables controlled • Access granted/denied per user, time, area and/or gate • Controlled by Group • Network & Interface • TCP/IP Ethernet (DHCP or Static IP) • Digital/Relay I/O – Door strike, Fire Alarm, Sensors, Exit Button • Wiegand Input/Output – Additional card readers can be configured. • Tamper-proof (Security screw, Detection alarm)

  13. VP-II NetControl-X-TWIC Software

  14. TWIC Enrolment/Verification Live Demo • Demonstration of Continuity of Trust • Integrated CodeBench PIVCheck • Enrolment of Vascular Pattern showing “Continuity-of-Trust” • TWIC Card User Vascular Pattern Verification • Attempted Enrolment of TWIC card on CCL List

  15. Our Customers Include: • Halifax Port Authority • Vancouver Port Authority • MOSAIC Ports • Georgia Port Authority • South Carolina Port Authority • New Orleans Airport • SEPTA (South East Philadelphia Transportation Authority • LYNX (Orlando Transit Authority) • FDNY - New York Fire Department • NY Department of Citywide Admin Services (DCAS) • Canadian Federal Government • Recall • G&D • Texas A&M University • Go Daddy • BC Lotteries • Eastern Utilities • Paul Mitchell The School • Mexican Government • Ministry of Justice (Mexico) • Department of Education (Colombia) • Korean Air Force (South Korea) • Samsung-S1 (South Korea) • NTT Communications (Japan) • TEPCO (Japan) • Nuclear Plant (Sweden) Our Customers Include Out of North America

  16. Facility Security Work Group (1)   A Home (Public Section) that contains publicly available Facility Security information of interest to the general community and the public (2)   A Hot News section that will allow the user to keep up-to-date on events in the Facility Security space over the past 30 days (3)   A Current Affairs section that will covers the events over the last year in TWIC, NMSAC & TSCC, CFATS & MTSA, Port-wide Security, MTSA II, Seafarer Access, Exercise Information, SSI & CVI, IMO and MARPOL (4)   A FSWG Links section that will allow the user to access other Facility Security web sites (5)   A Product and Services section that contains publicly available vendor products and services information relating to Maritime Security (6)   A Members Only password secure FSWG section that contains information determined by the workgroup members to remain within this section. The Members Only section also contains a password secure section for Task Group working documents that are in the process of development. www.FSWG.org

More Related