SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Business Case:
Executive Summary 
e-ID is the electronic counterpart to a national identification card (NIC). In a changing world moving more towards online based services in both the public and private sectors, an ID is more than a proof of identity. The M2SYS AFIS e-ID solution can serve in multiple sectors (e.g. social security, education, telephony services, banking services, taxation) depending on the context of the deployment. 
www.m2sys.com 
2
Problem Statement 
Developments of biometric technology are no longer in an embryonic stage and have been used successfully in the context of ID documents for over 10 years (28 January 2002) where approximately 89.5 million cards have been issued as of 2012. 33 National e-ID projects have already deployed and another 22 are in definition/specification phase and the e-ID system as a whole has few drawbacks. However, issues like data protection, privacy, information liability, access authority, and the quality of authentication remain heavily disputed issues. 
Political Issues 
Legal Issues 
Infrastructure Issues 
Privacy Issues 
Drawbacks 
www.m2sys.com 
3
eID Goals & Objectives 
Stop illegal immigration 
Prevent unauthorized access 
Increase document security 
Reduce terrorism threats 
Reduce potential acts of crime such as murder, robbery, drug trafficking 
Ensure better citizen benefits 
More effective implementation of law & justice 
Improved governance 
www.m2sys.com 
4
Global e-ID Deployments 
www.m2sys.com 
5 
Source: https://www.tractis.com/countries
Benefits of using e-ID 
Supporting e-services - simplifying access 
Ensure better citizen benefit program 
Improving national security 
Increasing administrative efficiency and reducing cost 
Limiting possibilities for fraud, identity theft, and phishing 
Establishing a population database 
Supporting mutual recognition in cross-border situations 
www.m2sys.com 
6
The M2SYS e-ID Solution 
Multi Modal AFIS: Includes facial recognition and iris recognition 
One-to-many (1:N) matching system in standard M2SYS AFIS Server 
Provides system access to other departments or organizations 
Multi-platform, scalable cluster architecture for parallel matching 
SSL/TLS connectivity for secure communication 
AES-256 based data encryption 
www.m2sys.com 
7
One ID – Many Applications 
Application Layer of M2SYS e-ID 
Border Control 
e-passport 
National ID 
Voter Registration 
Latent Print 
Health Care & Welfare 
Public Safety 
Biometric Overview 
•Iris 
•Palm Vein 
•Fingerprint 
•Facial Capture 
Matching System 
•One-to-many Matching System 
•One-to-many Biometric Matching 
•Multi-platform for Parallel Matching 
One Biometric Database 
www.m2sys.com 
8
Recommended Uses for M2SYS e-ID 
www.m2sys.com 
e-ID Core purpose: identify and authenticate citizens 
eSocial 
Access to social security services 
eHealth Access to health care services 
Public Safety Identifying criminal, forgery protection, & identity theft 
eVoting 
Registering to vote, and voting in elections to promote fairness 
Move from simple identification to multi-purpose card 
Broad coverage of governmental and private areas 
Driver: Create added value for the citizen 
M2SYS e-ID: One Card Multiple Use 
9
Conclusion 
Growing security problems around the world are leading to more frequent requests for proof of identity. Biometrics in the context of ID documents has been researched and deployed for the last 10 years, proving to be an efficient, effective, and secure way to manage identities. The adoption rate of biometric e-IDs are increasing across the globe as more governments discover their advantages and the M2SYS e-ID is a biometric national ID solution that is designed to meet the evolving identity needs of any country. It’s fault tolerant architecture, disk mirroring, automated database backups, and disaster recovery options provides a secure national population register. 
www.m2sys.com 
10
Contact Us 
Corporate Headquarter: 
1050 Crown Pointe Pkwy. 
Suite 850 
Atlanta, GA 30338 
USA 
Asia Office: 
House-279, Road-19, 
Mohakhali DOHS, 
Dhaka 1216 
Bangladesh 
E-mail: info@m2sys.com 
Phone: +1 (770) 393 0986 
Website: www.m2sys.com 
Get Social: 
Facebook: https://www.facebook.com/m2sys 
Twitter: @M2SYS 
LinkedIn: http://www.linkedin.com/company/m2sys-technology 
Blog: blog.m2sys.com 
YouTube: http://www.youtube.com/m2sys 
Google+: https://plus.google.com/M2SYS/ 
www.m2sys.com 
11

Contenu connexe

En vedette

The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
Amusement park industry in india
Amusement park industry in india Amusement park industry in india
Amusement park industry in india Gopal Sarkar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Chainer入門と最近の機能
Chainer入門と最近の機能Chainer入門と最近の機能
Chainer入門と最近の機能Yuya Unno
 

En vedette (12)

The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
Amusement park industry in india
Amusement park industry in india Amusement park industry in india
Amusement park industry in india
 
Piston less pump
Piston less pumpPiston less pump
Piston less pump
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Sop for security
Sop for securitySop for security
Sop for security
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Chainer入門と最近の機能
Chainer入門と最近の機能Chainer入門と最近の機能
Chainer入門と最近の機能
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 

Plus de M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Plus de M2SYS Technology (17)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Dernier

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Benefits of Using Biometric Identification Management for eID Initiatives

  • 2. Executive Summary e-ID is the electronic counterpart to a national identification card (NIC). In a changing world moving more towards online based services in both the public and private sectors, an ID is more than a proof of identity. The M2SYS AFIS e-ID solution can serve in multiple sectors (e.g. social security, education, telephony services, banking services, taxation) depending on the context of the deployment. www.m2sys.com 2
  • 3. Problem Statement Developments of biometric technology are no longer in an embryonic stage and have been used successfully in the context of ID documents for over 10 years (28 January 2002) where approximately 89.5 million cards have been issued as of 2012. 33 National e-ID projects have already deployed and another 22 are in definition/specification phase and the e-ID system as a whole has few drawbacks. However, issues like data protection, privacy, information liability, access authority, and the quality of authentication remain heavily disputed issues. Political Issues Legal Issues Infrastructure Issues Privacy Issues Drawbacks www.m2sys.com 3
  • 4. eID Goals & Objectives Stop illegal immigration Prevent unauthorized access Increase document security Reduce terrorism threats Reduce potential acts of crime such as murder, robbery, drug trafficking Ensure better citizen benefits More effective implementation of law & justice Improved governance www.m2sys.com 4
  • 5. Global e-ID Deployments www.m2sys.com 5 Source: https://www.tractis.com/countries
  • 6. Benefits of using e-ID Supporting e-services - simplifying access Ensure better citizen benefit program Improving national security Increasing administrative efficiency and reducing cost Limiting possibilities for fraud, identity theft, and phishing Establishing a population database Supporting mutual recognition in cross-border situations www.m2sys.com 6
  • 7. The M2SYS e-ID Solution Multi Modal AFIS: Includes facial recognition and iris recognition One-to-many (1:N) matching system in standard M2SYS AFIS Server Provides system access to other departments or organizations Multi-platform, scalable cluster architecture for parallel matching SSL/TLS connectivity for secure communication AES-256 based data encryption www.m2sys.com 7
  • 8. One ID – Many Applications Application Layer of M2SYS e-ID Border Control e-passport National ID Voter Registration Latent Print Health Care & Welfare Public Safety Biometric Overview •Iris •Palm Vein •Fingerprint •Facial Capture Matching System •One-to-many Matching System •One-to-many Biometric Matching •Multi-platform for Parallel Matching One Biometric Database www.m2sys.com 8
  • 9. Recommended Uses for M2SYS e-ID www.m2sys.com e-ID Core purpose: identify and authenticate citizens eSocial Access to social security services eHealth Access to health care services Public Safety Identifying criminal, forgery protection, & identity theft eVoting Registering to vote, and voting in elections to promote fairness Move from simple identification to multi-purpose card Broad coverage of governmental and private areas Driver: Create added value for the citizen M2SYS e-ID: One Card Multiple Use 9
  • 10. Conclusion Growing security problems around the world are leading to more frequent requests for proof of identity. Biometrics in the context of ID documents has been researched and deployed for the last 10 years, proving to be an efficient, effective, and secure way to manage identities. The adoption rate of biometric e-IDs are increasing across the globe as more governments discover their advantages and the M2SYS e-ID is a biometric national ID solution that is designed to meet the evolving identity needs of any country. It’s fault tolerant architecture, disk mirroring, automated database backups, and disaster recovery options provides a secure national population register. www.m2sys.com 10
  • 11. Contact Us Corporate Headquarter: 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 USA Asia Office: House-279, Road-19, Mohakhali DOHS, Dhaka 1216 Bangladesh E-mail: info@m2sys.com Phone: +1 (770) 393 0986 Website: www.m2sys.com Get Social: Facebook: https://www.facebook.com/m2sys Twitter: @M2SYS LinkedIn: http://www.linkedin.com/company/m2sys-technology Blog: blog.m2sys.com YouTube: http://www.youtube.com/m2sys Google+: https://plus.google.com/M2SYS/ www.m2sys.com 11