SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
DEVELOPING EFFECTIVE IDENTIFICATION
INTRODUCTION

One very important element of access control is identification. Before we talk
about identification let us refresh our minds with what access control is. Access
control is a system which enables an authority to control access to areas and
resources in a given physical facility or computer-based information system. An
access control system, within the field of physical security, is generally seen as the
second layer in the security of a physical structure.

Access control is, in reality, an everyday phenomenon. A lock on a car door is
essentially a form of access control. A PIN on an ATM system at a bank is another
means of access control. The possession of access control is of prime importance
when persons seek to secure important, confidential, or sensitive information and
equipment. Access control requires identification, authorization, and inspection.

Be they staff, visitors, contractors, suppliers or customers it is very important to
have an effective way of identifying anyone or items that come into our facilities
or go into the various departments or sections in our organization.

Visitors, Contractors, Suppliers Identification

All visitors or suppliers or contractors to any facility should be required to identify
themselves. When they are allowed to enter after they have established themselves
as being on an authorized call, they should be limited to predetermined,
unrestricted areas. The obvious exception is in firms where the public has free
access to the facility—for example, retail stores.

If possible, sales, service, and trade personnel should receive clearance in advance
on making an appointment with the person responsible for them being there.
Although this is not always possible, most businesses deal with such visitors on an
appointment basis, and a system of notifying the security personnel can be
established in a majority of cases.

In some cases, it may be advisable to issue passes that clearly designate these
people as visitors. If they will be escorted to and from their destination, a pass
system is probably unnecessary.

To achieve security objectives without alienating visitors and without in any way
interfering with the business operation, any effective control system must
incorporate certain specific elements to accomplish its aims. It must limit entry to
people who are authorized to be there and be able to identify such people. It must
have a procedure by which persons may be identified as being authorized to be in
certain areas, and it must prevent theft, pilferage, or damage to the facility’s assets.
It must also prevent injury to the visitor.

Employee Identification
Small industrial facilities and most offices find that personal identification of
employees by guards or receptionists is adequate protection against intruders
entering under the guise of employees. In organizations of more than 50 employees
per shift or in high turnover businesses, this type of identification is inadequate.
The opportunity for error is simply too great.

Today the most practical and generally accepted system is the use of badges or
identification cards to improve on personally identifying employees. These
personalized ID cards should have facial imaging, and could also have biometric
identity used with access control technology. This will make it unlikely that access
to secured areas will be gained by someone other than the person intended.

They should contain a clear and recent photograph of the bearer, preferably in
color. The photograph should be at least 1 inch square and should be updated every
two or three years or when there is any significant change in facial appearance,
such as the badge holder growing or removing a beard or mustache.

One good method of taking photographs involve making two pictures
simultaneously – one photograph affixed or scanned and pasted on the
identification card and the other on a security file or reference. Should the
employee lose or damage the card, the duplicate should not be used for
replacement – a new set of photographs should be taken but the old copy should be
kept. The reason is to guard against possible use for breach of security by a look-
alike, or should the card turn up in a police investigation or some other situation.
When these happen the company can verify a card found and turned in to ensure
the authenticity of the document. When the card turns out to be a forgery, this can
alert the company to new security problem of imposters trying to enter the
company area with forged ID cards or trying to implicate an employee.

ID cards should be numbered serially and a log book containing the numbers and
employees to whom issued should be kept. The serial number of the card sent to
the personnel department for entry to the employee records. The system should
designate when, where, how, and to whom ID cards should be displayed; what is to
be done in case an employee loses the pass; procedures for retrieving cards from
terminating employees; and a system for cancellation and reissue of all cards,
either as a security review or when a significant and specific number of cards have
been reported lost or stolen.

The best security includes employees wearing their ID cards to enable observation
by security officers and other company employees.

To be effective, cards must be tamper-resistant. The badge should, in addition,
contain vital statistics such as date of birth, height, weight, color of hair and eyes,
gender, and both thumbprints. It should be laminated and of sturdy construction. In
cases where facility areas are set off or restricted to general employee traffic, the
badge might be color-coded to indicate the areas to which the bearer has authorized
access.

It should be noted that a badge system is only be as effective as its enforcement.
Facility guards are responsible for seeing that the system is adhered to, but they
must have the cooperation of the majority of the employees and the full support of
management.


BIOMETRICS AS A MODE OF IDENTIFICATION

Biometrics takes unique physical characteristics of an individual and uses them for
identification and verification to do something he or she has been authorized to do.
Vascular patterns, hand print, finger print, iris patterns, and even voice can be used
to ensure that an individual is who he or she says he or she is, and to let people
know that they have been given permission to do whatever it is they are attempting
to do.

In highly sensitive operations this is used to grant them access or deny access to
unauthorized persons. They include the following:

Fingerprint Identification

Fingerprint readers take impressions of the friction ridges of the skin on the
underside of the tip of the fingers. Fingerprints are used to identify an individual,
are unique and different to everyone and do not change over time. Even identical
twins who share their DNA do not have the same fingerprints.

Fingerprints are formed when the friction ridges of the skin come in contact with
a surface that is receptive to a print by using an agent to form the print like
perspiration, oil, ink, grease, etc. The agent is transferred to the surface and
leaves an impression which forms the fingerprint.

There are several methods of biometric fingerprinting. A livescan devise
basically reads or photographs fingerprints by measuring the physical difference
between ridges and valleys. The procedure for capturing a fingerprint using a
sensor consists of rolling or touching with the finger onto a sensing area,
capturing the difference between valleys and ridges using a reader.

In order to ―lift‖ latent prints it is necessary to use a developer like a powder or
chemical reagent to develop or produce a high degree of visual contrast between
ridge patterns and the surface on which it was left. There are many different types
of chemicals used in developing fingerprints and choosing one depends on the
agent used to make the fingerprint.

There are advances in fingerprinting technique which is non-contact and does not
require the use of developers, has the potential to allow fingerprints to be retrieved
while still leaving intact any material that could subsequently be subjected to DNA
analysis.

Besides forensic agencies, many companies are turning to fingerprint readers to
identify employees and potential security threats, as in airports and government
agencies. The computer hardware industry has used fingerprint readers / scanners
for years and the automotive industry is starting to catch on to the idea to identify
their owners.

Whatever the application, fingerprints are the most commonly used forensic
evidence worldwide.

Iris Recognition

Iris cameras perform recognition detection of a person’s identity by mathematical
analysis of the random patterns that are visible within the iris of an eye from
some distance. It combines computer vision, pattern recognition, statistical
inference and optics.
Of all the biometric devices and scanners available today, it is generally conceded
that iris recognition is the most accurate. The automated method of iris
recognition is relatively new.

The iris is the coloured ring around the pupil of every human being and no two
are alike. Each are unique in their own way, exhibiting a distinctive pattern that
forms randomly in uteron. The iris is a muscle that regulates the size of the pupil,
controlling the amount of light that enters the eye.

Iris recognition is rarely impeded by glasses or contact lenses and can be scanned
from 10cm to a few meters away. The iris remains stable over time as long as
there are no injuries and a single enrolment scan can last a lifetime.

Iris scanning is an ideal way of biometric identification since the iris is an internal
organ that is largely protected by damage and wear by the cornea. This makes it
more attractive then fingerprints which can be difficult to recognize after several
years of certain types of manual labour.

The general uses of iris recognition so far have been: substituting for passports
(automated international border crossing); aviation security and controlling access
to restricted areas at airports; database access and computer login; premises access
control; hospital settings including mother-infant pairing in maternity wards;
"watch list" screening at border crossings; and it is under consideration
for biometrically enabled National Identity Cards.

Having only become automated and available within the last decade, the iris
recognition concept and industry are still relatively new. Through the
determination and commitment of the iris industry and government evaluations,
growth and progress will continue.

Facial Recognition

A facial recognition device is one that views an image or video of a person and
compares it to one that is in the database. It does this by comparing structure,
shape and proportions of the face; distance between the eyes, nose, mouth and
jaw; upper outlines of the eye sockets; the sides of the mouth; location of the nose
and eyes; and the area surrounding the cheek bones.

Upon enrolment in a facial recognition program, several pictures are taken of the
subject at different angles and with different facial expressions. At time of
verification and identification the subject stands in front of the camera for a few
seconds, and then the image is compared to those that have been previously
recorded.

To prevent a subject from using a picture or mask when being scanned in a facial
recognition program, some security measures have been put into place. When the
user is being scanned, they may be asked to blink, smile or nod their head.
Another security feature would be the use of facial thermography to record the
heat in the face.

Some facial recognition software algorithms identify faces by extracting features
from an image of a subject's face. Other algorithms normalize a gallery of face
images and then compress the face data, only saving the data in the image that can
be used for facial recognition. A probe image is then compared with the face data.

A fairly new method on the market is three-dimensional facial recognition. This
method uses 3-D sensors to capture information about the shape of a face. This
information is then used to identify distinctive features on the face, such as the
contour of eye sockets, nose and chin.

Another new technique in facial recognition uses the visual details of the skin, as
captured in standard digital or scanned images. This technique is called skin
texture analysis, turns the unique lines, patterns, and spots apparent in a person's
skin into a mathematical space.

The benefits of facial recognition are that it is not intrusive, can be done from a
distance even without the user being aware they are being scanned. (i.e.: bank or
government office)

What sets apart facial recognition from other biometric techniques is that it can be
used for surveillance purposes; as in searching for wanted criminals, suspected
terrorists, and missing children. Facial recognition can be done from far away so
with no contact with the subject so they are unaware they are being scanned.

Facial recognition is most beneficial to use for facial authentication than for
identification purposes, as it is too easy for someone to alter their face, features
with a disguise or mask, etc. Environment is also a consideration as well as subject
motion and focus on the camera.

Facial recognition, when used in combination with another biometric method, can
improve verification and identification results dramatically.

Vein Recognition

Biometrics, such as with vein recognition, refers to methods for recognizing
individual people based on unique physical and behavioral traits. Physiological
biometrics is one class of biometrics that deals with physical characteristics and
attributes that are unique to individuals. Vein recognition is a type of biometrics
that can be used to identify individuals based on the vein patterns in the human
finger.

Vein recognition is a fairly recent technological advance in the field of
biometrics. It is used in hospitals, law enforcement, military facilities and other
applications that require very high levels of security. Vein recognition biometric
devices can also be used for PC login, bank ATM identification verification, and
many other applications such as opening car doors.

Vein recognition biometrics is a particularly impressive and promising
technology because it requires only a single-chip design, meaning that the units
are relatively small and cheap. The ID verification process is very fast and
contact-less. Using a light-transmission technique, the structure of the vein
pattern can be detected, captured and subsequently verified.

The user's vein pattern structure is image processed by the device and stored in a
relevant data repository in the form of digital data. Many feel that vein
recognition biometrics can produce higher accuracy rates than finger print
recognition and finger vein patterns are virtually impossible to forge.

There are a variety of methods for vein recognition biometric technology. Some
companies have developed devices that scan the vein structure pattern in the index
finger, or more than one finger at a time. Others have developed vein recognition
devices designed for reading the vein patterns located under the palm and at the
back of the hand. The variety of devices available gives a wide selection of choices
for consumers to meet different needs and demands.

Vein patterns are unique to each individual and they do not change over time
except in size so it is hardly possible to fool the technology. Vein recognition
technology is arguably the most suitable for high-security deployment.

Other promising facts about vein recognition biometric technologies include their
capability to fuse with existing biometric technologies. Vein recognition can be
used along with fingerprint and hand geometric technology, provide one-to-many
matching and also enhance security and decrease vulnerability for fraud.

Adoption of vein recognition technologies has been highest among financial
institutions and it is used commonly for ATM identity verification and PC login
authentication where high security is a necessity.

2D Barcode Readers

2D Barcode biometrics refers to a two-dimensional method of representing digital
security information stored in biometric technologies. Suppliers of this
technology provide 2D barcode biometrics applications products for businesses,
often for fast, easy product identification, or easier and more efficient time and
attendance systems for employees.

Companies using 2D barcode biometric technologies can expect greater
efficiency and higher productivity because such products greatly lessen the time it
takes to correctly identify merchandise and lowers the necessary time and effort
for doing payroll if the company uses a 2D barcode identification system for
logging hours.

2D barcode technologies work in concert with physiological biometric security
devices to ensure the maximum level of security possible and identify both items
and people. At airports for example, a biometric fingerprint sensor converts the
individual's unique fingerprint pattern into a 2D barcode which is subsequently
printed on the passengers boarding pass.

Converting a biometric physical characteristic such as fingerprints, vein structure
pattern, iris, or DNA into a 2D barcode helps process complex data more quickly
and easily in many large and busy networks such as at airports. The development
and improvement of 2D barcode technology has allowed for increased levels of
security without slowing down travelers and holding up lines.

All the complex data which physiological biometric devices deal with such as the
complex and intricate vein structure patterns, digitized in vein recognition
biometrics, is condensed into a flat, small rectangle area called a 2D barcode.

For applications in retail, production and manufacturing, 2D barcode technology
assists business owners to run their companies efficiently, productively, and with a
heightened sense of security. Profitability increases with the application of 2D
barcode technologies because it allows for asset tracking and theft prevention
security systems. Owners and managers can track their products resulting in fewer
losses and less potential for human error.

Driver's licenses, and many other major Identification cards, especially important
ones all contain 2D barcodes to make verification quick and easy. The 2D barcode
on the card is extremely useful because it contains a great amount of data that is
nearly impossible to replicate and all on a small compact area.

The effectiveness and popularity of 2D barcodes has given rise to an entire
industry of mobile biometric devices used for important security purposes, such
applications would be impossible without 2d barcodes. In government, law
enforcement and the military, mobile devices using biometric identification
authentication techniques rely on 2D barcodes to verify and transmit important
data across significant distances.

2D barcodes work by using upper and lower case letters, numerical symbols and
special characters all compressed very small into a compact area. Some barcodes
even use compressed images. The information contained in this compressed format
is read extremely quickly and easily by a digital device.

CONCLUSION

Identification is a key aspect of security which is growing in wider application in
various security settings. It has transcended physical and documented identification
to high technology system-based identification. Organizations that are serious with
preventing unauthorized intrusion into their physical facilities or virtual networks
now look to new and improved technologies used for identification.

In developing identification systems, organizations must look beyond the basic
employee, visitor, contractor or supplier identification as these may be limited in
the access control of highly facilities and operations.



Thank you.

Ogaga Ovbioghor

11/7/11

Contenu connexe

Tendances

Biometrics application
Biometrics applicationBiometrics application
Biometrics applicationDivya Shah
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and beckyAdam Nickey
 

Tendances (15)

Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Finger print
Finger printFinger print
Finger print
 
Biometrics
BiometricsBiometrics
Biometrics
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 

Similaire à Developing Effective Identification 1

Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Biometrics
BiometricsBiometrics
BiometricsN/A
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanAsad Zaman
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric SolutionTanvir Ahmed
 
Biometric Access Control Systems
Biometric Access Control SystemsBiometric Access Control Systems
Biometric Access Control SystemsSafe-Systems Inc.
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 

Similaire à Developing Effective Identification 1 (20)

Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
H029044050
H029044050H029044050
H029044050
 
Biometrics
BiometricsBiometrics
Biometrics
 
Shamaas
ShamaasShamaas
Shamaas
 
13_2
13_213_2
13_2
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Biometric Essay
Biometric EssayBiometric Essay
Biometric Essay
 
Biometrics
BiometricsBiometrics
Biometrics
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
Biometric Access Control Systems
Biometric Access Control SystemsBiometric Access Control Systems
Biometric Access Control Systems
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 

Developing Effective Identification 1

  • 1. DEVELOPING EFFECTIVE IDENTIFICATION INTRODUCTION One very important element of access control is identification. Before we talk about identification let us refresh our minds with what access control is. Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure. Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment. Access control requires identification, authorization, and inspection. Be they staff, visitors, contractors, suppliers or customers it is very important to have an effective way of identifying anyone or items that come into our facilities or go into the various departments or sections in our organization. Visitors, Contractors, Suppliers Identification All visitors or suppliers or contractors to any facility should be required to identify themselves. When they are allowed to enter after they have established themselves as being on an authorized call, they should be limited to predetermined, unrestricted areas. The obvious exception is in firms where the public has free access to the facility—for example, retail stores. If possible, sales, service, and trade personnel should receive clearance in advance on making an appointment with the person responsible for them being there. Although this is not always possible, most businesses deal with such visitors on an appointment basis, and a system of notifying the security personnel can be established in a majority of cases. In some cases, it may be advisable to issue passes that clearly designate these people as visitors. If they will be escorted to and from their destination, a pass system is probably unnecessary. To achieve security objectives without alienating visitors and without in any way
  • 2. interfering with the business operation, any effective control system must incorporate certain specific elements to accomplish its aims. It must limit entry to people who are authorized to be there and be able to identify such people. It must have a procedure by which persons may be identified as being authorized to be in certain areas, and it must prevent theft, pilferage, or damage to the facility’s assets. It must also prevent injury to the visitor. Employee Identification Small industrial facilities and most offices find that personal identification of employees by guards or receptionists is adequate protection against intruders entering under the guise of employees. In organizations of more than 50 employees per shift or in high turnover businesses, this type of identification is inadequate. The opportunity for error is simply too great. Today the most practical and generally accepted system is the use of badges or identification cards to improve on personally identifying employees. These personalized ID cards should have facial imaging, and could also have biometric identity used with access control technology. This will make it unlikely that access to secured areas will be gained by someone other than the person intended. They should contain a clear and recent photograph of the bearer, preferably in color. The photograph should be at least 1 inch square and should be updated every two or three years or when there is any significant change in facial appearance, such as the badge holder growing or removing a beard or mustache. One good method of taking photographs involve making two pictures simultaneously – one photograph affixed or scanned and pasted on the identification card and the other on a security file or reference. Should the employee lose or damage the card, the duplicate should not be used for replacement – a new set of photographs should be taken but the old copy should be kept. The reason is to guard against possible use for breach of security by a look- alike, or should the card turn up in a police investigation or some other situation. When these happen the company can verify a card found and turned in to ensure the authenticity of the document. When the card turns out to be a forgery, this can alert the company to new security problem of imposters trying to enter the company area with forged ID cards or trying to implicate an employee. ID cards should be numbered serially and a log book containing the numbers and employees to whom issued should be kept. The serial number of the card sent to
  • 3. the personnel department for entry to the employee records. The system should designate when, where, how, and to whom ID cards should be displayed; what is to be done in case an employee loses the pass; procedures for retrieving cards from terminating employees; and a system for cancellation and reissue of all cards, either as a security review or when a significant and specific number of cards have been reported lost or stolen. The best security includes employees wearing their ID cards to enable observation by security officers and other company employees. To be effective, cards must be tamper-resistant. The badge should, in addition, contain vital statistics such as date of birth, height, weight, color of hair and eyes, gender, and both thumbprints. It should be laminated and of sturdy construction. In cases where facility areas are set off or restricted to general employee traffic, the badge might be color-coded to indicate the areas to which the bearer has authorized access. It should be noted that a badge system is only be as effective as its enforcement. Facility guards are responsible for seeing that the system is adhered to, but they must have the cooperation of the majority of the employees and the full support of management. BIOMETRICS AS A MODE OF IDENTIFICATION Biometrics takes unique physical characteristics of an individual and uses them for identification and verification to do something he or she has been authorized to do. Vascular patterns, hand print, finger print, iris patterns, and even voice can be used to ensure that an individual is who he or she says he or she is, and to let people know that they have been given permission to do whatever it is they are attempting to do. In highly sensitive operations this is used to grant them access or deny access to unauthorized persons. They include the following: Fingerprint Identification Fingerprint readers take impressions of the friction ridges of the skin on the underside of the tip of the fingers. Fingerprints are used to identify an individual, are unique and different to everyone and do not change over time. Even identical
  • 4. twins who share their DNA do not have the same fingerprints. Fingerprints are formed when the friction ridges of the skin come in contact with a surface that is receptive to a print by using an agent to form the print like perspiration, oil, ink, grease, etc. The agent is transferred to the surface and leaves an impression which forms the fingerprint. There are several methods of biometric fingerprinting. A livescan devise basically reads or photographs fingerprints by measuring the physical difference between ridges and valleys. The procedure for capturing a fingerprint using a sensor consists of rolling or touching with the finger onto a sensing area, capturing the difference between valleys and ridges using a reader. In order to ―lift‖ latent prints it is necessary to use a developer like a powder or chemical reagent to develop or produce a high degree of visual contrast between ridge patterns and the surface on which it was left. There are many different types of chemicals used in developing fingerprints and choosing one depends on the agent used to make the fingerprint. There are advances in fingerprinting technique which is non-contact and does not require the use of developers, has the potential to allow fingerprints to be retrieved while still leaving intact any material that could subsequently be subjected to DNA analysis. Besides forensic agencies, many companies are turning to fingerprint readers to identify employees and potential security threats, as in airports and government agencies. The computer hardware industry has used fingerprint readers / scanners for years and the automotive industry is starting to catch on to the idea to identify their owners. Whatever the application, fingerprints are the most commonly used forensic evidence worldwide. Iris Recognition Iris cameras perform recognition detection of a person’s identity by mathematical analysis of the random patterns that are visible within the iris of an eye from some distance. It combines computer vision, pattern recognition, statistical inference and optics.
  • 5. Of all the biometric devices and scanners available today, it is generally conceded that iris recognition is the most accurate. The automated method of iris recognition is relatively new. The iris is the coloured ring around the pupil of every human being and no two are alike. Each are unique in their own way, exhibiting a distinctive pattern that forms randomly in uteron. The iris is a muscle that regulates the size of the pupil, controlling the amount of light that enters the eye. Iris recognition is rarely impeded by glasses or contact lenses and can be scanned from 10cm to a few meters away. The iris remains stable over time as long as there are no injuries and a single enrolment scan can last a lifetime. Iris scanning is an ideal way of biometric identification since the iris is an internal organ that is largely protected by damage and wear by the cornea. This makes it more attractive then fingerprints which can be difficult to recognize after several years of certain types of manual labour. The general uses of iris recognition so far have been: substituting for passports (automated international border crossing); aviation security and controlling access to restricted areas at airports; database access and computer login; premises access control; hospital settings including mother-infant pairing in maternity wards; "watch list" screening at border crossings; and it is under consideration for biometrically enabled National Identity Cards. Having only become automated and available within the last decade, the iris recognition concept and industry are still relatively new. Through the determination and commitment of the iris industry and government evaluations, growth and progress will continue. Facial Recognition A facial recognition device is one that views an image or video of a person and compares it to one that is in the database. It does this by comparing structure, shape and proportions of the face; distance between the eyes, nose, mouth and jaw; upper outlines of the eye sockets; the sides of the mouth; location of the nose and eyes; and the area surrounding the cheek bones. Upon enrolment in a facial recognition program, several pictures are taken of the subject at different angles and with different facial expressions. At time of
  • 6. verification and identification the subject stands in front of the camera for a few seconds, and then the image is compared to those that have been previously recorded. To prevent a subject from using a picture or mask when being scanned in a facial recognition program, some security measures have been put into place. When the user is being scanned, they may be asked to blink, smile or nod their head. Another security feature would be the use of facial thermography to record the heat in the face. Some facial recognition software algorithms identify faces by extracting features from an image of a subject's face. Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that can be used for facial recognition. A probe image is then compared with the face data. A fairly new method on the market is three-dimensional facial recognition. This method uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the face, such as the contour of eye sockets, nose and chin. Another new technique in facial recognition uses the visual details of the skin, as captured in standard digital or scanned images. This technique is called skin texture analysis, turns the unique lines, patterns, and spots apparent in a person's skin into a mathematical space. The benefits of facial recognition are that it is not intrusive, can be done from a distance even without the user being aware they are being scanned. (i.e.: bank or government office) What sets apart facial recognition from other biometric techniques is that it can be used for surveillance purposes; as in searching for wanted criminals, suspected terrorists, and missing children. Facial recognition can be done from far away so with no contact with the subject so they are unaware they are being scanned. Facial recognition is most beneficial to use for facial authentication than for identification purposes, as it is too easy for someone to alter their face, features with a disguise or mask, etc. Environment is also a consideration as well as subject motion and focus on the camera. Facial recognition, when used in combination with another biometric method, can
  • 7. improve verification and identification results dramatically. Vein Recognition Biometrics, such as with vein recognition, refers to methods for recognizing individual people based on unique physical and behavioral traits. Physiological biometrics is one class of biometrics that deals with physical characteristics and attributes that are unique to individuals. Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger. Vein recognition is a fairly recent technological advance in the field of biometrics. It is used in hospitals, law enforcement, military facilities and other applications that require very high levels of security. Vein recognition biometric devices can also be used for PC login, bank ATM identification verification, and many other applications such as opening car doors. Vein recognition biometrics is a particularly impressive and promising technology because it requires only a single-chip design, meaning that the units are relatively small and cheap. The ID verification process is very fast and contact-less. Using a light-transmission technique, the structure of the vein pattern can be detected, captured and subsequently verified. The user's vein pattern structure is image processed by the device and stored in a relevant data repository in the form of digital data. Many feel that vein recognition biometrics can produce higher accuracy rates than finger print recognition and finger vein patterns are virtually impossible to forge. There are a variety of methods for vein recognition biometric technology. Some companies have developed devices that scan the vein structure pattern in the index finger, or more than one finger at a time. Others have developed vein recognition devices designed for reading the vein patterns located under the palm and at the back of the hand. The variety of devices available gives a wide selection of choices for consumers to meet different needs and demands. Vein patterns are unique to each individual and they do not change over time except in size so it is hardly possible to fool the technology. Vein recognition technology is arguably the most suitable for high-security deployment. Other promising facts about vein recognition biometric technologies include their
  • 8. capability to fuse with existing biometric technologies. Vein recognition can be used along with fingerprint and hand geometric technology, provide one-to-many matching and also enhance security and decrease vulnerability for fraud. Adoption of vein recognition technologies has been highest among financial institutions and it is used commonly for ATM identity verification and PC login authentication where high security is a necessity. 2D Barcode Readers 2D Barcode biometrics refers to a two-dimensional method of representing digital security information stored in biometric technologies. Suppliers of this technology provide 2D barcode biometrics applications products for businesses, often for fast, easy product identification, or easier and more efficient time and attendance systems for employees. Companies using 2D barcode biometric technologies can expect greater efficiency and higher productivity because such products greatly lessen the time it takes to correctly identify merchandise and lowers the necessary time and effort for doing payroll if the company uses a 2D barcode identification system for logging hours. 2D barcode technologies work in concert with physiological biometric security devices to ensure the maximum level of security possible and identify both items and people. At airports for example, a biometric fingerprint sensor converts the individual's unique fingerprint pattern into a 2D barcode which is subsequently printed on the passengers boarding pass. Converting a biometric physical characteristic such as fingerprints, vein structure pattern, iris, or DNA into a 2D barcode helps process complex data more quickly and easily in many large and busy networks such as at airports. The development and improvement of 2D barcode technology has allowed for increased levels of security without slowing down travelers and holding up lines. All the complex data which physiological biometric devices deal with such as the complex and intricate vein structure patterns, digitized in vein recognition biometrics, is condensed into a flat, small rectangle area called a 2D barcode. For applications in retail, production and manufacturing, 2D barcode technology assists business owners to run their companies efficiently, productively, and with a
  • 9. heightened sense of security. Profitability increases with the application of 2D barcode technologies because it allows for asset tracking and theft prevention security systems. Owners and managers can track their products resulting in fewer losses and less potential for human error. Driver's licenses, and many other major Identification cards, especially important ones all contain 2D barcodes to make verification quick and easy. The 2D barcode on the card is extremely useful because it contains a great amount of data that is nearly impossible to replicate and all on a small compact area. The effectiveness and popularity of 2D barcodes has given rise to an entire industry of mobile biometric devices used for important security purposes, such applications would be impossible without 2d barcodes. In government, law enforcement and the military, mobile devices using biometric identification authentication techniques rely on 2D barcodes to verify and transmit important data across significant distances. 2D barcodes work by using upper and lower case letters, numerical symbols and special characters all compressed very small into a compact area. Some barcodes even use compressed images. The information contained in this compressed format is read extremely quickly and easily by a digital device. CONCLUSION Identification is a key aspect of security which is growing in wider application in various security settings. It has transcended physical and documented identification to high technology system-based identification. Organizations that are serious with preventing unauthorized intrusion into their physical facilities or virtual networks now look to new and improved technologies used for identification. In developing identification systems, organizations must look beyond the basic employee, visitor, contractor or supplier identification as these may be limited in the access control of highly facilities and operations. Thank you. Ogaga Ovbioghor 11/7/11