Você está na página 1de 149

Workshop Biometria NEC

2021

Guilherme Angarano

1 © NEC Corporation 2019


2017 NEC Group Internal Use Only
O que é Biometria?

▌Prof. Google responde:


 Biometria, em termos simples, significa o estudo estático das características físicas e comportamentais dos
seres vivos; bio (vida) + metria (medida). Esse termo é utilizado também como maneira de identificar
unicamente um indivíduo por meio de suas características físicas ou comportamentais.

▌Quais são essas Biometrias e qual a maturidade dos sistemas?

Parte do corpo Biometria Maturidade Precisão Tipo de Coleta


Dedo Digital / Dactilar Anos 70 Alta Contato / Ótica
Rosto Facial / Prosopográfica Anos 90 Media Ótica
Palma Palmar Anos 80 Alta Contato / Ótica
Olhos Iris Anos 00 Alta Ótica
Veias Venal Anos 00 Media Contato / Ótica
Pés Plantar Anos 10 Baixa Contato
Voz Vocal Anos 80 Baixa Áudio

2 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Como é possível detectar?

▌Digital: Através da leitura de pontos característicos do fluxo das linhas e sulcos, e suas
variâncias morfológicas, chamadas papilas

▌Facial: Através da leitura de pontos posicionais, distancia entre olhos, nariz, boca,
orelhas, formato do rosto

▌Palmar: Similar à digital, é caracterizado pelo fluxo de linhas e sulcos da palma da mão

▌Iris: Mapeamento dos anéis coloridos e pontos existentes em torno da pupila, centro
das pupilas, as bordas das pupilas e todos os padrões desenhados na íris

▌Venal Palmar: Pelo fluxo sanguíneo se realiza o mapeamento e posicionamento das


veias

▌Plantar: Através da estrutura e geometria dos pés, distanciamento da planta do pé


para os dedos, podendo também ser usadas as linhas igual a impressão digital

▌Vocal: Pelo padrão de onda sonora, sua frequência (espectrograma), sequência de


frames, informação linguística, e as características vocais na emoção do locutor

3 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Estrutura Dactilar
Área
Impressão nuclear
digital ou Área
datilograma marginal

Área basilar / Dobra interfalangeana

Linha de
Delta: Galton
Núcleo:
Intersecção das
Ponto mais três áreas. Quantidade
alto do ciclo de cristas
mais interno entre o
núcleo e o
delta

4 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Detalhes das Cristas

▌Primeiro Nível de Detalhe - Fluxo e padrão de cristas.


▌Segundo Nível de Detalhe - Minúcias.
▌Terceiro Nível de Detalhe - Poros, incipientes, etc.

5 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Estrutura Dactilar - Minúcias

▌São as diversidades das cristas,


comumente bifurcação e fim de linha

6 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Morfologia Dactilar - Padrão

▌Padrões mais comuns:


 Arco
 Presilhas (Esquerda e Direita)
 Verticilo

 Cicatriz / indefinido

7 © NEC Corporation 2019


2017 NEC Group Internal Use Only
O que o algoritmo faz?

▌Identifica o núcleo
▌Identifica as minúcias
▌Identifica o padrão
▌Monta a matriz matemática do dedo

8 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Decadactilar com má qualidade

9 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Decadactilar com boa qualidade

10 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NIST

11 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC Quality Control advantage over NFIQ

NEC IQL indicates if a fingerprint is really


good for matching!

NFIQ: This index varies from 1 to 5 (short range) and has a very simple
criteria for image analysis: If it contains or not a circular pattern. This is
not good enough!!!

NEC IQL: This index varies from 0 to 100 (much more precise range)
and can identify if all criterias are met for a good matching result.

12 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Composição Decadactilar

•Padrão W, R, L, A, S

DEDO •Núcleo
•Minucias

•Padrão
DECA WWLARLAAWS
•Qualidade

•Dados
FILTROS biográficos
•Tipo de Registro

13 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Impressão Palmar

14 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Impressão Palmar

▌Obedece aos mesmos


critérios da impressão
digital com minúcias

▌Não possui núcleo

▌Dividida usualmente em
3 partes
 Infradigital
 Hipotenar
 Tenar

15 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Impressão Palmar

▌NEC utiliza 2 regiões apenas


 Palma
 Palma de escritor

▌Não é realizada busca de palma com


palma inteira, é segmentada em janelas
menores ou seções da palma

16 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Identificação Criminal

▌Impressões latentes / fragmento ▌Situações comuns


papilar  Levantamento de suspeitos
 Foto de cena de crime
 Empodoamento • Furto
• Roubo
 Entintamento
• Latrocínio
• Falsidade ideológica
 Identificação Post-Mortem
(IML)
 Identificação de indigentes
 Desastres em Massa (Boate
Kiss)

▌Tipos de suporte
 Papel
 Plástico
 Objetos tocados
 Epiderme

17 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Pesquisa de latentes - Zoneamento

18 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Pesquisa de latentes – Core / Axis

19 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Identificação Facial

▌Realiza modelagem 3D da cabeça

▌Utiliza os pontos característicos da face e sua


relação
 Olhos
 Ponta do Nariz
 Centro da Boca

▌Gera Template Facial

Rosto
detectado Modelado com
Modelado 3D iluminação

20 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Identificação Criminal

▌Por reconhecimento facial ▌Situações comuns


 Fotos  Levantamento de suspeitos
 Videos de cena de crime
 Retrato Falado • Furto
• Roubo
• Latrocínio
• Falsidade ideológica
 Identificação Post-Mortem
(IML)
 Identificação de indigentes
 Desastres em Massa (Boate
Kiss)

▌Tipos de suporte
 Documentos
 CFTV
 Smartphone
 Redes sociais

21 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Feature Extraction e Tipos de Templates

▌Feature Extraction é o método onde o sistema realiza a obtenção dos pontos


característicos da biometria (vetorização) e monta o modelo matemático (template).

▌Templates possuem diferentes formatos para cada tipo de biometria e são agregados
para a formação de um registro ou transação que serão enviados para compor ou
consultar a Base Biométrica (inserção, consulta, alteração, exclusão).

Modal Algorithms
Face NeoFace S14,S17,S18,V2,G2,M20,M30
Iris NEC Niris, DeltaID
Finger CML, LFML, Fis(FMP5,PC2)
Palm PC3R, LFML

▌Em desenvolvimento algoritmo para reconhecimento facial com máscara (HD5).


Roadmap para Março/2021.

22 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Instituto de Identificação

Organização por
morfologia!!!

Comparação manual

23 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Instituto de Identificação

24 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC’s leadership in Biometrics technology

• Having 40 years experience in fingerprint matching, and 20


years experience in face matching, NEC has achieved the
position of global leader in biometrics technology.

DNA Voiceprint Vein Iris Palmprint Fingerprint Face

Research and
development phase Commercially available engines

Keeping ahead of the market trend, NEC has devoted strong efforts in
commercialization of high-performance Multi-Biometrics solutions.

25 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Transações em sistemas biométricos

▌Cadastro ▌Validação / Verificação


 Realiza a inserção de um registro com busca
biométrica  1:1 – Confronta se a biometria questionada
▌Registro corresponde a uma biometria já conhecida na BD
 Realiza a inserção de um registro sem busca
biométrica
▌Busca / Pesquisa
▌Atualização
 Atualiza os registros (com substituição biométrica  1:N – Realiza uma pesquisa de biometria
parametrizável – keep.best / keep.last) questionada contra toda as biometrias da Base
▌Exclusão de Dados
 Desabilita o registro, exclui apenas do
Sync
comparador (não exclui da BD)  1:L – Realiza uma pesquisa de biometria
Async questionada restrita, contra uma lista
▌Trazer Biometria
segmentada ou lista de interesse
 Recupera as biometrias da BD e exibe ao
operador
 N:N – Realiza uma pesquisa de todas as
▌Consulta Status biometrias contra todas as biometrias. Pouco
 Informa qual fase e status se encontra a usada, mas se aplica principalmente quando há
transação necessidade de depuração de Base de Dados

26 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Composição dos Sistemas Biométricos
▌ Geralmente visam atender 2 cenários macro:
 ATIVO
• Surveillance (Real Time)
 PASSIVO
• AFIS / ABIS / MBIS para uso Civil, Criminal e Forense

▌ São modulares e montados dependendo de cada tipo de necessidade, dentre eles:


 Terminais de usuário
• Cadastramento e Captura ao Vivo (scanners óticos, câmera fotográfica, pad de assinatura, kit cenário)
• Aquisição (scanner de mesa)
• Aquisição em massa (scanner massivo)
• Verificação e Divergência
• Perícia Latente
• Runtime / SDK
 Workflow do Cliente
• Componente que realiza a interação com os terminais de usuário, atendendo aos fluxos processuais do Instituto de Identificação, tais como:
Cadastro, Impressão, Registro de passagens, gestão documental, interação com sistemas de outras entidades, gestão de cadastro biográfico,
laudos, processos, antecedentes, etc.
 Frontend / Workflow Biométrico
• Componente que gerencia todas as interfaces entre sistemas externos, transações, estruturas de decisão, conexão entre os terminais, base
biográfica, versionamento de registros, arquivos, relatórios, gerenciamento de tráfego, notificações, etc. É basicamente um orquestrador de
serviços biométricos e interage com o sistema do cliente.
 Backend / Motor Biométrico
• Componente que realiza todos os trabalhos de comparação biométrica, iniciando com o Feature Extraction, gerando templates, realizando as
tarefas de registro, alteração, deleção, consulta, verificação

27 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Exemplo Arquitetura
PROCERGS SCOPE NEC SCOPE

NEC SDK PID Runtime  Enrollment


NEC Verification Terminal  Analisys

DB PROCERGS SII DB IESB DB AIM XM


(Biographic Data) (Control Data) (Biometric Data)
New Transactions
TR, TC, TI, TU, TD, TLI
VER, VP, FR, FC, FI,
FU, FD, FLI, PC, PU,
PD
Civil
AIM XM
New Transactions
LC, LI, LLI, LD, LU,
REST LFC, LFI, LFU, LFD

Camera
SII PROCERGS IESB

Criminal
Latent (IBW + REVEAL) Flatbed
Webservice to
Peripherals obtain demographic
data from
candidates when in
verification phase

28 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Postos de Trabalho e Terminais

29 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Workflow Cliente – Passos para desenvolvimento / customização

1 – Conceito

4 – Código
3 – Fluxos

2 – Entradas e Saídas

5 – Interfaces

30 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Sistemas Biométricos

31 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Desenho da arquitetura (HLD)
Backup/Mng
FC SAN
vLAN
192.168.1.0/24

TL01 – 192.168.1.160 BK01.MASTER


BK02.MEDIA
192.168.1.54
192.168.1.55
TL02– 192.168.1.161
FW (HA)
SSP-GO 192.168.1.1
vLAN 10.0.3.0/24 192.168.2.1
192.168.3.1
Heartbeat vLAN 192.168.7.1
DMA vLAN 192.168.4.0/24 10.50.17.3
192.168.2.0/24 10.0.3.70

ORACLE
192.168.100.1
192.168.100.2

NODE07 NODE08 NODE05 NODE06 NODE03 NODE04 NODE01 NODE02

DB01.DMA DB02.DMA WP01.DMA WP02.DMA IO.DMA IO.DMA WM01.DMA WM02.DMA MA01.DMA MA02.DMA
192.168.1.18 192.168.1.19 192.168.1.24 192.168.1.25 192.168.1.26 192.168.1.27 192.168.1.21 192.168.1.27 192.168.1.15 192.168.1.16
192.168.2.18 192.168.2.19 192.168.2.24 192.168.2.25 192.168.2.26 192.168.2.27 192.168.2.21 192.168.2.27 192.168.2.15 192.168.2.16
192.168.100.1 192.168.100.2 192.168.4.26 192.168.4.27 192.168.4.21 192.168.4.27 192.168.3.15 192.168.3.16
10.0.3.75 10.0.3.76 192.168.4.15 192.168.4.16

ORACLE
192.168.101.1
192.168.101.2

DB01.AIM DB02.AIM DM01.AIM DM02.AIM MM01.AIM MM02.AIM VP01.AIM VP02.AIM


192.168.1.45 192.168.1.46 LB01.AIM LB02.AIM
192.168.1.48 192.168.1.49 192.168.1.42 192.168.1.43 192.168.1.51 192.168.1.52
192.168.3.45 192.168.3.46 192.168.1.12 192.168.1.13
192.168.3.48 192.168.3.49 192.168.3.42 192.168.3.43 192.168.3.51 192.168.3.52
192.168.101.1 192.168.101.2 192.168.3.12 192.168.3.13

AIM vLAN
10.0.10.0/24
GRMAFISStor01
192.168.1.65
MU01.AIM MU02.AIM MU03.AIM MU04.AIM MU05.AIM MU06.AIM MU07.AIM MU08.AIM MU09.AIM MU10.AIM
192.168.1.81 192.168.1.82 192.168.1.83 192.168.1.84 192.168.1.85 192.168.1.86 192.168.1.87 192.168.1.88 192.168.1.89 192.168.1.90 OKI vLAN
192.168.3.81 192.168.3.82 192.168.3.83 192.168.3.84 192.168.3.85 192.168.3.86 192.168.3.87 192.168.3.88 192.168.3.89 192.168.3.90
192.168.7.0/24

GRMAFISStor02
192.168.1.67

WF01 UIDS01 SQLORA1 WF02 UIDS02 SQLORA2


192.168.1.28 192.168.1.29 192.168.1.30 192.168.1.31 192.168.1.32 192.168.1.33
192.168.7.28 192.168.7.29 192.168.7.30 192.168.7.31 192.168.7.32 192.168.7.33

32 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Alta Disponibilidade / Failover / Disaster Recovery

33 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Dando nome aos bois

▌NEC Global ▌NEC America NDP ▌NEC Argentina


 Terminais de captura ao vivo  Terminais de captura ao vivo  Terminais de captura ao vivo
• Smartscan • Smartscan • Terminal de Enrolamiento

 Terminais diversos  Terminais diversos  Terminais diversos


• IBW-L (Latentes) • IBW-L (Latentes) • Terminal de Latentes + DMA Manager
• IBW-QC (Controle de Qualidade) • IBW-QC (Controle de Qualidade) • Terminal VQA
• IBW-Browse (Fila de Transações) • IBW-Browse (Fila de Transações) • Terminal View
• IBW-Tenprint (Aquisição) • IBW-Tenprint (Aquisição) • Terminal de Verificación
• Neoface Reveal (Facial Forense) • Neoface Reveal (Facial Forense) • Terminal de Digitalización

 Workflow Biometrico  Workflow Biometrico  Workflow Biometrico


• iESB • iESB • AWM

 Motor Biométrico  Motor Biométrico  Motor Biométrico


• AIM-XM • AIM-XM • AIM-XM

 Bioservicio

34 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Criminal ABIS Solution Global

IBW
AIM XM
1.1
NeoFace NeoFace V
iESB
Reveal

Smart
Scan

35 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Produtos indicados para cada tamanho de sistema

Big
IBW/Reveal
System SmartScan/iESB

AWM AIM XM

Small
Terminals AWM
System

Civil Criminal

36 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AIM-XM Components Overview

37 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Segment / BIN

▌Same design with previous AIM production MATCHER / Comparador


Capsule ( Fixed Size )
Capsule Segment
Capsule
BIN (Logical)
Capsule
Capsule Segment
Capsule

▌Segment
 Physical organization including fixed number of capsules
 Belongs to one BIN
 Megha distributes and assigns search job to Kaveri SNs by segment

▌BIN
 Logical organization including segments
 Belong to one CapsuleType
 Client specifies BinID to submit enrollment and identification requests

38 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Serviços agregados / vendáveis da NEC e Third-Party

▌Digitalização e deduplicação de acervo

▌Operação de sistema

▌Suporte presencial e/ou remoto (L1, L2, L3), 8x5 ou 24x7

▌Integrações (quando eu quero comunicar com outros sistemas)


 Suporte Integrações

▌Customizações (quando eu quero uma adaptação do sistema)


 Suporte Customizações

▌Desenvolvimento (quando eu quero um ou mais módulos que não existem)


 Suporte Desenvolvimento

▌SOC / NOC

39 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC Biometrics Systems Products / Capabilities

▌NEC MBIS
 Enterprise Multi-Modal Biometric Identification System (MBIS) solutions designed with our
law enforcement customers for Records & ID Bureaus and Crime Labs
 Delivers the flexibility, accuracy and scalability required by law enforcement agencies
 Consists of AIM XM, iESB, IBW, Archive, and ISM
▌SmartScan / UnCabinet
 Multi-modal biometric capture platform for fingerprints and palm prints, mugshots with
SMTs, irises and more
▌NeoScan 45
 Mobile Biometric Capture tool for capturing fingerprints in the field
▌NeoFace Smart ID
 Product suite for mobile biometric capture, submission to MBIS with real time response
▌NeoFace Reveal
 Highly accurate, fast and flexible facial recognition solution for investigative workflows
using images and video evidence of varying quality.
▌NeoFace Express
 NeoFace Express is a rapid facial recognition authentication platform employing distributed processing
techniques and patent pending workflows.

40 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AIM XM

41 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC Introduces AIM XM

▌Multi-Modal Matching Service:


 Fingerprint & Palmprint Matching
 Facial & Iris Recognition
 Latent Matching
 Multi-Algorithm and Multi-Phased

▌Multi-Use:
 Identification: 1:Many
 Verification: 1:One
 Investigation: Unknown:Many
1:Unknown

▌Extensible and Scalable

42 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AIM XM Features and Benefits

▌Could ready – scale up and down with resilience.


▌Multi-tier: Each layer performs a specific operation.
Removes bottlenecks caused by overlapping
responsibilities.
▌Distributed: Works on a single box or on different boxes
connected through a network.
▌Grid/cluster computing: Increases the operational
efficiency of the entire system.
▌Scalable: Scales up and scales out with ease.
▌No single point of failure.
▌Unique design to address low latency.
▌Operational simplicity
▌Deleted biometric IDs are reused. So no stale records.

43 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AIM XM Architecture

44 © NEC Corporation 2019


2017 NEC Group Internal Use Only
MBIS Solution
ABIS NEC O AIM-XM usa uma estratégia de transação “stateless” permitindo que qualquer intermediário
de pesquisa chame qualquer nó de pesquisa disponível. A estratégia “stateless” elimina a
necessidade de um gerenciador de transações interno, reduzindo a latência associada ao
gerenciamento de transações
LB

A arquitetura do AIM-XM baseia-se na computação distribuída em grade paralela, que fornece


desempenho superior (processamento paralelo massivo) e escalabilidade (adicionando novos
servidores plug-and-play conforme necessário), além de permitir computação tolerante a
iESB iESB DBS EC/SC/SB/VC VN EN/SN falhas: várias cópias dos dados correspondentes são distribuídas por todo o sistema. O risco de
um ponto único de falha do sistema correspondente é eliminado, fornecendo alta
disponibilidade para o projeto.

Smart Load Balancer


BKS

Search Search Verify/ Verify/


Controller Scalable Controller Extract Scalable Extract
Controller Controller
External Systems
Tape
AIM DBS
Disk Storage Storage
Smart Load Balancer

Search Broker Search Broker Scalable Search Broker Search Broker


O NEC Advanced Identity Manager (AIM-XM) é um comparador multimodal com
serviços integrados para impressões digitais, impressões palmares, e
reconhecimento de faces. O AIM-XM é uma solução de correspondência de Smart Load Balancer
software escalável COTS (Commercial Off-The-Shelf), que não depende de Scalable
hardware proprietário para sua escalabilidade ou desempenho. O AIM-XM
Search
Search
Search VerifyVerifyVerify Extract
Extract
Extract
fornece serviços de extração, identificação, verificação e fusão usando as NodeNodeNode Node Node Node Node NodeNode
tecnologias de impressão digital, impressão palmar, e biometria facial mais
Cascade Multi Modal Matching
precisas e comprovadas do setor.
Probe Finger | Face | Iris Gallery Finger | Face | Iris Finger | Face | Iris

45 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Advanced Identity Manager (AIM XM)

AIM XM Architecture
Multimodal Software Matcher – Face,
Finger, IRIS

SOA Solution with Well Defined Web


Service Interface

Encode & Search Capability on


Fingerprint, Palm, Face & Iris

Flexibility for Frequent Technology


Refreshments

Uses COTS Hardware – General Purpose


Servers & Linux Operating system

46 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC MBIS - A Platform for Growth

Standards Based Design • SOA, COTS Platform, and Interoperability

Next Generation Multimodal • Flexibility to Add Additional Modalities and Services


Identification Platform

Innovative Solution • Virtualized Platform – Enhanced Scalability &


High Availability Reliability

• Latest NIST Field Proven Algorithms and Fusion


High Accuracy Capability

COOP Capability • Active-Active Disaster Recovery Site Operation

• Parallel Operation During Migration, and Transition


Low Risk Migration of Current AFIS Data

47 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AWM – Características Técnicas

▌Plataforma (OS) ▌Frameworks


 Red Hat Enterprise Linux (RHEL) 7.2  Apache Tomcat
 Windows  Active Message Queue
▌Java Development Kit 1.8.0_111 (o  Hibernate
superior)  Dozer
 Jackson
▌Apache ActiveMQ Stable Release >5.14
 Jersey
▌Apache Tomcat 9.X o superior
 Angular 4
▌Base de Datos:  Jasper Reports
 Oracle 12i (ojdbc8-12.2.0.1.0)
▌Integrado a AIM 5.3, AIM XM

48 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Cenario High Availability

KAVERI

AWM/AMQ 1 LVS MEGHA


LVS 1
1
IP
IP virtual
virtual KAVERI
MEGHA
LVS
LVS 2
AWM/AMQ 2 2

KAVERI

Base de Datos
Oracle RAC
Instancia
Instancia
AIM
AWM

49 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AWM – Components

Person Cases Common


IO AWM
Client REST

Biometric Security AIM

Data Base AMQ

50 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AWM – Components

AWM
REST interface (awm service)

Apache Tomcat
AWM

AMQ
Queue Queue Queue Queue Queue
Service

Apache Active Message Queue

51 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Filas e Mensageria

PC
DONE SUCCESS
INIT FE.
TENPRINT.
SEARCH
VALIDATE.
INPUT.
CREATE

ERROR

END.ERROR

52 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Workflow - Multiprocessamento

T1 VALIDATE. QUALITY
INIT INPUT. FE FINGER SEARCH VT NOTIFY
FE FACE CONTROL
CREATE

T2 VALIDATE. QUALITY
INIT INPUT. FE FINGER SEARCH VT NOTIFY
FE FACE CONTROL
CREATE

T3 VALIDATE. QUALITY
INIT INPUT. FE FINGER SEARCH VT NOTIFY
FE FACE CONTROL
CREATE

T4 VALIDATE. QUALITY
INIT INPUT. FE FINGER SEARCH VT NOTIFY
FE FACE CONTROL
CREATE

T5 VALIDATE. QUALITY
INIT INPUT. FE FINGER SEARCH VT NOTIFY
FE FACE CONTROL
CREATE

53 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Fases e Status

Job
Info
Initial TCN, Status, Phase Type
Phase Message
History Phase 1, Status 1, duracion
Phase 2, Status 2, duracion
Phase 3, Status 3, duracion
Person PersonId Phase 4, Status 4, duracion

Phase 1 Message Tenprint


Finger
Image
Faceset Quality
Template
Face
Phase N Message Image
Quality
Template
Inner Person
Candidates [Person]
Person ID
Message
Final Tenprint Candidate
Phase Finger Candidate
Data Face Candidate
Match Detail

Base Match Detail

54 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AWM – Transações

▌Transacciones para la administración de Personas (Huellas Decadactilares y/o Rostro):


 PC: Person Create : PI + PR
 PR: Person Register
 PU: Person Update
 PD: Person Delete

▌Transacciones para Identificación y Verificación


 PI: Person Inquire (Identificación 1:N)
 PVER: Verificación 1:1
 PGET: Obtener datos de Persona

55 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Transações – PC, PI y PR

▌Impressões dactilares – Score de decadactilar


Threshold de Auto Hit (UAH)
Threshold de Auto No Hit (UANH)
Threshold por quantidade de dedos que deram hit:
(UAH, UANH) (1), (UAH, UANH) (2) ……………, (UAH, UANH)(10)

Veredito
AUTO HIT
UAH

INDETERMINADO

UANH
AUTO NO HIT

56 © NEC Corporation 2019


2017 NEC Group Internal Use Only
FAR / FRR

57 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Curvas ROC e DET

▌Receiver operating
characteristic
 é uma representação gráfica que
ilustra o desempenho (ou
performance) de um sistema
classificador binário à medida
que o seu limiar de discriminação
varia

▌Detection error tradeoff


 é um gráfico de taxas de erro
para sistemas de classificação
binários, traçando a taxa de
rejeição falsa vs. taxa de
aceitação falsa

58 © NEC Corporation 2019


2017 NEC Group Internal Use Only
AWM – Terminais

Client

Enrolment
AWM
Terminal

Verification
Terminal

59 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Evolution of SDK

Bio
SDK Service

Integrated by code Consumed as a microservice

60 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Different SDK´s

SDK C SDK C
32 bits 64 bits

Client
application SDK .NET SDK .NET
32 bits 64 bits

SDK Java SDK Java


32 bits 64 bits

Each client application, depending on needs a different SDK.

61 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Restfull interface

Client Bio
SDK
application Service
Rest
Interface

Consumed as a rest api, no matter how the client application is developed

62 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Bioservice

▌Microservices API REST features:

 Fingerprint Image format conversion:  Slap Segmentation


• Conversion BMP to WSQ • Left hand segmentation WSQ or RAW
• Conversion WSQ to BMP • Right hand segmentation WSQ or RAW
• Conversion WSQ to RAW • Thumbs segmentation WSQ or RAW
• Complete hands segmentation: Left hand, right hand
and thumbs WSQ or RAW
 Single Fingerprint Operations:
• Finger Quality IQL, NFIQ and NFIQ 2
 Group of fingers operations:
• Finger Extraction to PC2
• Duplicated Fingerprint Check
• Finger Matching 1:1 finger

 Slap and Rolled Fingers operation


• Sequence Fingerprint left hand
• Sequence Fingerprint right hand
• Sequence Fingerprint thumbs

63 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Bioservice – Floating licences - By License Gateway

License
Gateway

64 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Protection

Floating licenses defined by NEC License Server with SORACO

ID App,
ID machine

Bio
Service
License

• First time BioService starts up registers on license server.

• After that, every time BioService starts up, renews its floating
license from NEC License Server, where the licenses are defined.
65 © NEC Corporation 2019
2017 NEC Group Internal Use Only
Terminal de Enrolamiento Web

▌Interface web
▌Servicio locales que manejan los dispositivos
▌Instalación y actualización remota.
▌Configuración centralizada desde servidor de configuración
▌Licenciamiento flotante para el bioservicio local
▌Captura de datos demográficos y biométricos desde escáner de documentos
▌Captura de huellas dactilares desde distintos dispositivos
▌Captura de Rostro e Iris
▌Importación y exportación de archivos ANSI-NIST
▌Modo offline y online con PWA (Aplicaciones Web Progresivas)
▌Conector a ABIS o Middleware de cliente

66 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Terminal de Enrolamiento Web

Interface Web

Servicio Servicio
Servicio Servicio
manejador de manejador de Servicio
manejador de manejador de
escáner de escáner de Biométrico
cámara pad de firmas
huellas documentos

67 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Manejador de Terminales

Idioma

Workstation Tipo de
Terminal Estilo (Look
GRUPO Web and Feel)

Tipo
Workstation GRUPO (enrolment
, verify)
Dispositivo
• Localización (Idioma)
• Estilo de la interfaz grafica
Configuracion
• Tipo de captura: Solo dedos,
de captura
rostro, 4-4-2,etc
• Dispositivos manejados Manejador
de
• Configuración de umbrales de
dispositivo
calidad

68 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Terminal de Enrolamiento Web – Configuração centralizada
▌Geral
 Biometrías obrigatórias: Digitais, Face y Assinatura

▌Impressoes dactilares
 Threshold de qualidade para cada tipo de dedo
 Quantidade de tentativas por baixa qualidade
 Threshold de comparação de impressões
 Modo de captura rolada, slap.

▌Face
 Rejeição de captura por não cumprimento de parametros ICAO
 Modo de face e iris o somente face

▌Modos de Captura de Impressões Digitais


 10 Dedos individuais planos
 10 Dedos rolados
 4-4-2
 4-4-1-1
 4-4-2 + 10 dedos rolados
 2-2-2-2-2
 2-2-2-2-1-1

69 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Terminal Manager - Instalacion

Instalación
Instalación inicial y
local mínima
actualización de versiones
de software automática

Terminal
Manager
Repositorio de
versiones

70 © NEC Corporation 2019


2017 NEC Group Internal Use Only
WEB Enrolment Terminal - Dispositivos soportados

• Cross Match EF200


• Cross Match V320
• Cross Match Patrol
• Gemalto CSD450F

• Logitech C525
• Logitech C920
• Logitech Orbit

71 © NEC Corporation 2019


2017 NEC Group Internal Use Only
WEB Enrolment Terminal - Dispositivos soportados

• ZK8500
• Futronic FS80
• Futronic FS88
• Secugen Hamster
• Jenetric Livetouch Quattro

72 © NEC Corporation 2019


2017 NEC Group Internal Use Only
WEB Enrolment Terminal - Dispositivos soportados

• Topaz 460
• Topaz 750

• Tascent Insight One


• iCam TD100

• Regula 70X4M

73 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IESB

74 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC Identity Enterprise Service Bus (iESB)

Web Services MQ SFTP SMTP RMI / IIOP

EXTERNAL MBIS COMMON SERVICES IDENTIFICATION


AGENCY SERVICES
GATEWAY Security & Access
Data Tranformation API Services Encoding & QC
Control
Regional
System Provisioning Identification (1:N)
MBIS Policy Management
Administration Services
National Configuration Verification Services
Backup Job Management
Police Management
Fusion Services
Reporting Auditing & Logs Monitoring Services
… WORKFLOWS
Resource
Data Access Archive Workflows Management
Management
Manual & Customized
Repository Services
Workflows

Workflow Manager Transaction Manager

Repository Manager Biometrics Manager

75 © NEC Corporation 2019


2017 NEC Group Internal Use Only
iESB - Workflow Management

▌Administrator Access to Change Decision


Points and Thresholds
▌Multiple Customized Workflows can
Coexist on Same Platform
▌Ability to Save Changes as a New
Workflow
▌Ability to Add New TOT and Associate with
a Workflow
▌MBIS Workflows to Support all Agency
Business Processes
▌Workflow Versioning and Rollback
Capability

76 © NEC Corporation 2019


2017 NEC Group Internal Use Only
iESB - Unified Database

Integrated repository for both MBIS & Archive, Disposition data


Composite Best Quality
John Doe
Tenprint Record

▌Single Point for Arrest 1 Initial NIST Record


Best Quality Palm

Database Management
Record

Local, State and FBI Responses Latent Event Record

▌Industry Standard
Format for Ten-Prints
Scanned or Imported Documents

and Latents Arrest 2 Initial NIST Record Latent Event Record

Latent - LFFS format Local, State and FBI Responses

with EFS (Extended Scanned or Imported Documents

Feature Set) Data


Arrest N Initial NIST Record Latent Event Record
Ten-Print – NIST and
EBTS Data Local, State and FBI Responses

Scanned or Imported
Scanned or Imported Documents
Documents

77 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Integrated Archive Web Client
NEC’s latest Archive application
features a web-based interface,
providing authorized users with
quick access to all biometric
records and associated documents
stored in the Archive repository.
The client includes a multitude of
searching, viewing, printing, and
management features through a
flexible, portable thin client
application.

78 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Integrated Archive Web Client
The Archive system is a
comprehensive and scalable data
repository solution for the storage
of ANSI/NIST and other ancillary
documents.
It provides a secure and quick method of
storing, retrieving, printing, and
managing biometric records associated
with identification and investigative
processing.

79 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Integrated System Monitoring (ISM)

The Integrated System Monitoring web application provides a central location for administrative
maintenance and monitoring of all MBIS functions, including:

Transaction Management– Enables the user to monitor the job status, manage job execution, and filter the
queue or search for jobs.
Report Generation – Provides predefined and ad hoc reporting capabilities on system utilization and database
statistics. All report and audit data is stored in the UDB, providing easy access to management and transaction
reports, and offering a complete audit trail necessary to track operational inconsistencies.
Administrative Tasks– Provides the ability to establish and maintain user IDs, passwords, and functional
authorizations for all MBIS applications. Administrators can also create domains (such as production or training)
and assign users to each domain. In addition, administrators can use ISM 2 to manage multiple workstations.
System Configuration – Allows the administrator to add or update the system configuration to ensure optimal
performance and matching accuracy.
System Monitoring – Provides administrators with system monitoring tools to monitor services at various
granular levels across the entire grid.
Advanced Configuration – Provides administrators with advanced configuration options for
viewing/adding/deleting/editing NIST data format templates, batch jobs, and code tables, as well as managing
servers and other utilities. The following figure depicts the Dashboard view that is displayed by default when
the user logs on to the ISM 2 application:

80 © NEC Corporation 2019


2017 NEC Group Internal Use Only
ISM - for System Management

▌ISM Web Client – System Administration and Monitoring

 Standard and Ad Hoc Reports


 User and Role Management
 System Monitoring
 Workflow and Configuration
Management

ISM – Dashboard View


81 © NEC Corporation 2019
2017 NEC Group Internal Use Only
SmartScan

82 © NEC Corporation 2019


2017 NEC Group Internal Use Only
SmartScan - Derived From Integra-ID MBIS & NeoFace

▌Similar Windows 10 GUI:


 Touch and Tablet Feature Control
 Familiar Start Menu & Edge Browser
 Microsoft Product Support thru 2025

▌Powerful Image Processing:


 NEC MBIS & NeoFace Quality Checks
 100% Confidence in Capture of
Fingerprints, Palms, Face & Irises

▌Easy to Learn, Train and Use


 Extensibility and Flexibility
 Scalability for Features & Modalities

84 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Collage of SmartScan Screenshots (Create, Capture & Submit)

85 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Collage of SmartScan Screenshots (Create, Capture & Submit)

86 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Collage of SmartScan Screenshots (Create, Capture & Submit)

Front 

87 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Collage of SmartScan Screenshots (Create, Capture & Submit)

88 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Collage of SmartScan Screenshots (Create, Capture & Submit)

89 © NEC Corporation 2019


2017 NEC Group Internal Use Only
SmartScan - Your Choice of Biometric Capture Hardware

91 © NEC Corporation 2019


2017 NEC Group Internal Use Only
SmartScan - Peripherals

Modality Primary Secondary


Friction Ridge Crossmatch LScan 500/1000 Green Bit MultiScan 527Crossmatch
Green Bit DactyScan 84 Guardian USB, 200 & 300
JENETRIC LIVETOUCH Integrated Biometrics Kojak
Facial Sony SNC-EP580/550/520 Sony DSC-QX100
Canon EOS Rebel T5 Canon PowerShot SX510 HS
Logitech Webcam C920e/C930e Creative Cam Sync HD Webcam
Iris IrisID iCam 7000/7100 IrisID T10
IrisID R100 & T10 CMI Tech BMT-20/EMX-30
Barcode RTScan Kiosk OEM PDF417 RT301 Datalogic Gryphon I GFS4400 2D
Zebra DS9208 Datalogic Magellan 800i and 1100i
Signature Topaz KioskGem T-S261-K Topaz SigGem T-L462 & T-LBK462
Topaz SigGem T-S261 Topaz SigGem T-LBK462-KA
Printers Dell CS510DE Lexmark CX510DE
Lexmark MS810DTN
92 © NEC Corporation 2019
2017 NEC Group Internal Use Only
IBW 5.1

93 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW5.1 Features

Multi-modality Support

• Supports Major modularity such as Finger, Palm, Face, Iris

Multiple Apps & Windows

• User can do operation in parallel

Touch Panel Support

• User can do intuitive operation

NEC’s Unique Latent Case Management System

• User can manage evidence ,document by case

Auto-LI Function

• Automatic Enhancement

94 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW Applications

▌Browse: Find Records based upon IDs and Meta-Data

▌Job Queue: Listing of Jobs including Per


Type/System/Person

▌Tenprint: Create New Person Records

▌QC Edit: Review and Edit Person Records

▌Latent: Create and Manage Latent Cases including


Evidence & More

▌Verify: Review and Compare Search Results

95 © NEC Corporation 2019


2017 NEC Group Internal Use Only
TI

▌TI - Tenprint Inquiry (background check)

1. Arrested! 2. Fingerprints 3. Input


and palm prints Demographics
capturing

5. Show
7. Return result search 4. Search
(first / repeated result against Tenprint
offender) Database

6. Tenprint Registration Tenprint


(in case TI is No-Hit) DB

96 © NEC Corporation 2019


2017 NEC Group Internal Use Only
LI

▌LI - Latent Inquiry (criminal serch using latent figerprint)

1. Incident occurred! 2. Latent capturing 3. Input Demographics

7.
5. Show search result 4. Search
Arrested!
against Tenprint
Database

6. Latent Registration Tenprint


Latent
DB (in case LI is No-Hit) DB

97 © NEC Corporation 2019


2017 NEC Group Internal Use Only
TLI

▌TLI – Tenprint / Latent Inquiry (other offence check)

1. Fingerprints 2. Input
and palm prints Demographics
capturing

5. Rearrested!

4. Show 3. Search
search result against Latent
Database

Latent
DB

98 © NEC Corporation 2019


2017 NEC Group Internal Use Only
LLI

▌LLI – Latent / Latent Inquiry (serial offence find)

1. Latent 2. Input
fingerprints / palm Demographics
prints capturing

4. Show 3. Search
search result against Latent
Database

5. Return result
(same offender) Latent
DB

99 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Tenprint

Tenprint

Create New
Edit Transaction
Transaction
Single Finger
Quick Search MMF Submit Tenprint Data

Scan Tenprint Data


Scan Scan -using Card & Scanner
-read image data
Enhance
Demographic Input Demographic
Edit Minutia
Tenprint image
Inquiry check

TI TR TLI combination
100 © NEC Corporation 2019
2017 NEC Group Internal Use Only
Tenprint Application – Scan Screen Example

▌ Entering Demographics – The user


may optionally enter a subject’s
demographic information on the
Demographics screen. Data is
validated based on demographic
validation rules for the selected TOT,
but full compliance is only required
when performing a Tenprint
Registration (TR).

▌ Submitting Tenprint Functions –


Following image editing, the user can
submit an individual or combination
tenprint function from the Inquiry
screen. The user can set the number
of candidates requested. The following
figure is an example of the Inquiry
screen displaying the search
parameters for a Tenprint Inquiry (TI).

101 © NEC Corporation 2019


2017 NEC Group Internal Use Only
QC Edit Application – Tenprint Tab Example

▌ Slap Edit Right/Left Tabs – Enable


users to replace rolled prints with
cropped slap prints, edit cores/axes,
and correct pattern types on rolled
prints.

▌ Slap Crop Tab – Displays segmented


slap print images above the
corresponding plain impressions,
enabling users to re-crop slap prints.

▌ Single Fingers Tab – Enables users


to zoom in on a single finger image;
display specific extraction details,
including skeleton, minutia, and
relation data; and to edit the zones
used for feature extraction..

102 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Verify Application
▌ The IBW 5 Verify
application
accommodates a wide
range of business
rules, such as double-
blind verification,
problem verification
(supervisor review),
and consolidation
verification (hits on
duplicate records),
depending on the
unique requirements of
each implementation.

▌ The user can begin


verifying jobs and
transactions by
selecting them
manually, or the
system can assign
pending verification
jobs/transactions
automatically based on
First In, First Out
(FIFO) prioritization.

103 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Scan Fingerprint Cards

104 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Big and Bold Bio/Demographic Data Entry

105 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Real Time Submission to MBIS for Search

106 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Discriminating Quality Control Review

107 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - QC Review of Fingerprints Every Which You Can

108 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - QC Review of Palmprints, Mugshots, Irises & More

109 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Easy to Read Job Queue of Results, History and More

110 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

111 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Available Search Verification of Tenprints

112 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Suite Tools for Search Verification

113 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Search Verification including Faces Too

114 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Browse for Records

115 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - And Look at Fingerprints, Palmprints, Mugshots & Descriptors

116 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

117 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

118 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

119 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

120 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

121 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Captura, Digitalização, Cropping, Verificação

122 © NEC Corporation 2019


2017 NEC Group Internal Use Only
LCMS

LCMS
• Set Case Information

Case Case
• Scan evidences
Creation Merge

Manual
Auto LI
LI
• Enhancement
• Calibrate
LI LLI • Edit minutia/core/axis
• Select rotation
tolerance
123 © NEC Corporation 2019
2017 NEC Group Internal Use Only
Latent Case Management System Application

▌The LCMS solution provides end-to-end latent case management, automating the
natural steps of latent examination across the enterprise for digital biometric assets
from all cases.

▌Case, latent, and evidence data is stored in a hierarchical structure. When the examiner
selects a case, all related latents and evidence can be selected and viewed. At any time
during or after the initial entry, the user can create associations to establish
relationships between latents and individual pieces of evidence; and additional
enhancements, image edits, searches, and registrations can be performed on previously
entered latents (for example, if an initial search yielded no results).

124 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Latentes

125 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Latent Enhancements
▌ Enhancing Latents
The Latent screen >
Enhance view provides
the ability to zoom,
trim (select a region of
interest), rotate, and
adjust the brightness
and contrast of a
latent.
It also enables the
user to apply a variety
of Basic
Enhancements.

▌ The ability to import


or export Adobe
Photoshop PSD files
is included to extend
enhancement
capabilities.

126 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Universal Latent Case Management of All Evidence

127 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Easy to Do Entry of Any and All Latent Prints

128 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Powerful Latent Image Enhancements - Before

129 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW - Powerful Latent Image Enhancement – And After

130 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Latentes

131 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Latentes

132 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC proprietary VRP Filter

Original Melhorada

133 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NEC proprietary VRP Filter

134 © NEC Corporation 2019


2017 NEC Group Internal Use Only
IBW – Terminal de Latentes

135 © NEC Corporation 2019


2017 NEC Group Internal Use Only
SmartScan – LiveScan Solution

▌What is SmartScan?
SmartScanTM is a complete solution for customers to capture
and submit multi-modal biometrics for multiple use cases:
 Criminal Identification & Booking
 Applicant Background Check
 Offender Registration
 Identity Credential Enrollment
 Personal Identity Verification

136 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NeoFace Reveal - Forensic Investigation Solution by Face
Dedicated to solving crimes, NeoFace
Reveal utilizes advanced facial
recognition technologies that turn
images previously considered of little or
no investigative value, into usable
evidence, leading to higher rates of
positive identification and suspect
apprehension. NEC MBIS
Available for
Standalone
and Client
Server
system

 Max Database size for Standalone is 500K.

Customer Needs:
Utilize Poor Quality Face Images as Evidence for Investigation
=> Advanced Image Editing/Enhancement Tools is highly required

137 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Pontos Edital

138 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Mapear questões críticas

139 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Mapeamento

140 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Mapeamento RCoC / NEC-J

141 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Mapeamento RCoC / NEC-J

142 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Mapeamento RCoC / NEC-J

143 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Sizing RCoC / NEC-J

144 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Sizing RCoC / NEC-J

145 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Sizing RCoC / NEC-J

146 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Ponto a ponto RCoC / NEC-J

▌Traduzir para Ingles


▌Converter para Excel
▌Confirmar atendimento dos pontos
▌Questionar cliente em caso de duvidas

147 © NEC Corporation 2019


2017 NEC Group Internal Use Only
NeoFace Watch

▌Abrir chamado no Zendesk


▌Preencher EULA
▌Preencher NFW Architecture Sizing Form

148 © NEC Corporation 2019


2017 NEC Group Internal Use Only
Preparação do pacote

▌Cotações com supply chain e/ou desenvolvimento de fornecedores conforme o caso


▌Armar o Bill Of Materials
▌Negociar descontos
▌Preparar proposta técnica com o atendimento dos pontos do edital

149 © NEC Corporation 2019


2017 NEC Group Internal Use Only
150 © NEC Corporation 2019
2017 NEC Group Internal Use Only
151 © NEC Corporation 2019
2017 NEC Group Internal Use Only

Você também pode gostar