170 likes | 653 Views
VP-II X TWIC Hand Vascular Pattern Recognition System. TWIC Operational Biometrics. FSWG - TRTG Meeting February 26, 2013 Presented by: Terry Wheeler. www.tech-sphere.com. AGENDA. Introduction to Techsphere and its TWIC Hand Vascular Pattern Recognition (HVPR) Solution
E N D
VP-II X TWIC Hand Vascular Pattern Recognition System TWIC Operational Biometrics FSWG - TRTG Meeting February 26, 2013 Presented by: Terry Wheeler www.tech-sphere.com
AGENDA • Introduction to Techsphere and its TWIC Hand Vascular Pattern Recognition (HVPR) Solution • What is “Alternate Biometrics” • Why/How it applies to real TWIC applications in operational port environments • NetControl-TWIC Software • Connected to 3rd Party PACS Systems • NetControl-TWIC-E – Enterprise PACS Solution • Live HVPR Enrolment/Verification Demonstration • Questions
The VP-II X-TWIC HVPR biometric system undeniably verifies users byutilizing a state-of-the-art recognitionalgorithm based on hand vascular patterns extracted by its infrared optical sensor system.
Noise removal algorithm Adaptive algorithm Alternate “Vascular” Biometrics • Advantages of Hand Vascular Pattern • Uniqueness - Even twins’ hands are different • Stability - No changes over long period • Excellent accuracy over long period • Large scale features - High performance even with reasonably big scars and contamination • Advantages of VP-II X • HCD (Human Criteria Decision) algorithm • Invisible biometric feature – Eliminate spoofing • Harsh environmental robustness • User privacy protected • Excellent user perception and convenience Raw Image Extracted Vascular Pattern Binary image Hand vascular extracting processing flow
Iris Vascular VP-II Finger Face Hand Geometry Biometric Alternatives Accuracy(FRR / FAR) Usability
Technology VP-II HVPR Fingerprint Hand Shape IRIS Advantages/Disadvantages O None-contacting Sensor O High Usability & Accuracy O Small size applications X Low Usability X Difficulty in use with a physical damages like scars. O High Usability X Low Accuracy (High FAR) X Hygienic problem by physical contact O High Accuracy X Difficulty in use with small eyes like oriental users. X User inconvenient by eye positioning (intrusive) Biometrics Technology Comparison |Technology comparison |VP-II X • Performance • Usability • Accuracy – FAR / FRR • Enrollment / Verification Speed (throughput) User convenience • User perception • Hygiene problems • No invasive • Robust • Poor environment - contamination / humidity • Physical feature damages – scars / wear Easy to use • Integrated networking • User Interface and management No privacy concerns Ease of setup and maintenance
Biometrics Systems General Factors in Choosing biometrics Performance • Usability • Accuracy – FAR / FRR • Enrollment / Verification Speed (throughput) Robust • Poor environment - contamination / humidity • Physical feature damages – scars / wear Ease of setup and maintenance User convenience • User perception • Hygiene problems • Non-invasive Easy to use • Integrated networking • User Interface and management No privacy concerns Biometric systems should be: • Eliminates user bottlenecks The VP-II has a biometric verification speed of 0.4 seconds. • Useable for whole population (user group) The VP-II provides 99.98% usability, which means almost all of the general population can use the system without any problems. • Does not leave a trace of residual features after use If a biometric system leaves residual features after physical contact, the features would be easily duplicated and/or forged. • Be able to reject non-human features from enrollment Non-human features should not be allowed to be enrolled by a biometric, for it to be considered a true biometric system. VP-II recognizes the most non-human features at enrollment.
VP-II X TWIC Overview VP-II Xis a biometric scanner which verifies users individually unique vascular patterns extracted from the hypoderm below the surface of the skin of the back of the hand using an infra-red based sensor device. |Utilized Technology: HVPR (Hand Vascular Pattern Recognition) |Usability: 99.98% |Accuracy: FAR: 0.0001%, FRR: 0.1% |Verification Speed: 0.4 sec / person |Hardware Overview • 65K Color 2.8” TFT LCD / 16 Keys / IR Sensor / Speaker • TCP/IP Ethernet, Wiegand In/Out, Serial ports, Digital I/O, USB 2.0 • Built-in card reader module & antenna * 13.5Mhz Mifare module for TWIC cards * 125Khz Proximity card module for alternative daily operational use
TWIC ICE List VP-II Listed in the TWIC ICE (Initial Capability Evaluation) List http://www.tsa.gov/assets/pdf/twic_ice_list.pdf
TWIC Continuity of Trust |TWIC Card Holder Enrollment – Continuity of Trust • Integrated Codebench PIVCheck (GSA FIPS 201 & TWIC ICE Approved) • TWIC Card Validity Check (TPK, CHUID) & CCL (Cancelled Card List) Check • Card holder’s PIN and Fingerprint Verification • Vascular Data Enrollment • Accepts successfully validated TWIC card and Card holder only • Securely places encrypted vascular biometric data & CHUID in the database • A Prox. Card assigned to a TWIC card can be enrolled to be used for verification • PACS Plug-in • Card Holder’s Name, CHUID, Expiry Date, Facial image are be exported to a PACS database
Verification for Access Control |Verification for Access Control – No TWIC Fingerprint reader required • CHUID only or CHUID + Vascular Biometrics • Set by the Port Authority or Automatically Determined by the MARSEC level • CCL (Cancelled Card List) and Expiration Date Checked at each verification process • Also applied when using an Optional Prox. Card (Matched to CHUID at Enrollment) • Access Grant • Wiegand Output to PACS (TWIC Standard Wiegand Format: 75 Bit) • Optional NetControl-X –TWIC-E Enterprise PACS Software with VP-II XG Door Controllers can be used for entire Access Control solution
Verification for Access Control |Access Control With VP-II NetControl-X PACS Software • NetControl-X TWIC Physical Access Control • VP-II XG Door Controller to strike a door • VP-II XC Access Control Unit to add card readers |Access Control Features • Enrollment / Verification / Event / Logs • Up to 50,000 users enrolled • Up to 2 vascular templates per user allowed, i.e., Right and Left hand • Stores up to 500,000 access events and system logs • Real time monitoring – Device status, Access transactions, Events, etc • Access permission • Up to 200 timezone/holiday tables controlled • Access granted/denied per user, time, area and/or gate • Controlled by Group • Network & Interface • TCP/IP Ethernet (DHCP or Static IP) • Digital/Relay I/O – Door strike, Fire Alarm, Sensors, Exit Button • Wiegand Input/Output – Additional card readers can be configured. • Tamper-proof (Security screw, Detection alarm)
TWIC Enrolment/Verification Live Demo • Demonstration of Continuity of Trust • Integrated CodeBench PIVCheck • Enrolment of Vascular Pattern showing “Continuity-of-Trust” • TWIC Card User Vascular Pattern Verification • Attempted Enrolment of TWIC card on CCL List
Our Customers Include: • Halifax Port Authority • Vancouver Port Authority • MOSAIC Ports • Georgia Port Authority • South Carolina Port Authority • New Orleans Airport • SEPTA (South East Philadelphia Transportation Authority • LYNX (Orlando Transit Authority) • FDNY - New York Fire Department • NY Department of Citywide Admin Services (DCAS) • Canadian Federal Government • Recall • G&D • Texas A&M University • Go Daddy • BC Lotteries • Eastern Utilities • Paul Mitchell The School • Mexican Government • Ministry of Justice (Mexico) • Department of Education (Colombia) • Korean Air Force (South Korea) • Samsung-S1 (South Korea) • NTT Communications (Japan) • TEPCO (Japan) • Nuclear Plant (Sweden) Our Customers Include Out of North America
Facility Security Work Group (1) A Home (Public Section) that contains publicly available Facility Security information of interest to the general community and the public (2) A Hot News section that will allow the user to keep up-to-date on events in the Facility Security space over the past 30 days (3) A Current Affairs section that will covers the events over the last year in TWIC, NMSAC & TSCC, CFATS & MTSA, Port-wide Security, MTSA II, Seafarer Access, Exercise Information, SSI & CVI, IMO and MARPOL (4) A FSWG Links section that will allow the user to access other Facility Security web sites (5) A Product and Services section that contains publicly available vendor products and services information relating to Maritime Security (6) A Members Only password secure FSWG section that contains information determined by the workgroup members to remain within this section. The Members Only section also contains a password secure section for Task Group working documents that are in the process of development. www.FSWG.org