Science.gov

Sample records for biometric identification cards

  1. A bimodal biometric identification system

    NASA Astrophysics Data System (ADS)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  2. Biometrics and ID Cards — Enablers for Personal Security

    NASA Astrophysics Data System (ADS)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  3. Biometrics and smart cards combine to offer high security

    SciTech Connect

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued.

  4. Biometric identification systems: the science of transaction facilitation

    NASA Astrophysics Data System (ADS)

    Rogers, Robert R.

    1994-10-01

    The future ofthe "secure transaction" and the success ofall undertakings that depend on absolute certainty that the individuals involved really are who and what they represent themselves to be is dependent upon the successful development of absolutely accurate, low-cost and easy-to-operate Biometric Identification Systems. Whether these transactions are political, military, financial or administrative (e.g. health cards, drivers licenses, welfare entitlement, national identification cards, credit card transactions, etc.), the need for such secure and positive identification has never been greater -and yet we are only at the beginning ofan era in which we will see the emergence and proliferation of Biometric Identification Systems in nearly every field ofhuman endeavor. Proper application ofthese systems will change the way the world operates, and that is precisely the goal ofComparator Systems Corporation. Just as with the photo-copier 40 years ago and the personal computer 20 years ago, the potential applications for positive personal identification are going to make the Biometric Identification System a commonplace component in the standard practice ofbusiness, and in interhuman relationships ofall kinds. The development of new and specific application hardware, as well as the necessary algorithms and related software required for integration into existing operating procedures and newly developed systems alike, has been a more-than-a-decade-long process at Comparator -and we are now on the verge of delivering these systems to the world markets so urgently in need of them. An individual could feel extremely confident and satisfied ifhe could present his credit, debit, or ATM card at any point of sale and, after inserting his card, could simply place his finger on a glass panel and in less than a second be positively accepted as being the person that the card purported him to be; not to mention the security and satisfaction of the vendor involved in knowing that

  5. Biometric identification: a holistic perspective

    NASA Astrophysics Data System (ADS)

    Nadel, Lawrence D.

    2007-04-01

    Significant advances continue to be made in biometric technology. However, the global war on terrorism and our increasingly electronic society have created the societal need for large-scale, interoperable biometric capabilities that challenge the capabilities of current off-the-shelf technology. At the same time, there are concerns that large-scale implementation of biometrics will infringe our civil liberties and offer increased opportunities for identity theft. This paper looks beyond the basic science and engineering of biometric sensors and fundamental matching algorithms and offers approaches for achieving greater performance and acceptability of applications enabled with currently available biometric technologies. The discussion focuses on three primary biometric system aspects: performance and scalability, interoperability, and cost benefit. Significant improvements in system performance and scalability can be achieved through careful consideration of the following elements: biometric data quality, human factors, operational environment, workflow, multibiometric fusion, and integrated performance modeling. Application interoperability hinges upon some of the factors noted above as well as adherence to interface, data, and performance standards. However, there are times when the price of conforming to such standards can be decreased local system performance. The development of biometric performance-based cost benefit models can help determine realistic requirements and acceptable designs.

  6. Biometric identification using local iterated function

    NASA Astrophysics Data System (ADS)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  7. [Personal identification with biometric and genetic methods].

    PubMed

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  8. On enabling secure applications through off-line biometric identification

    SciTech Connect

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  9. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper. PMID:22547926

  10. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  11. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  12. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  13. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  14. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  15. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  16. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Identification cards. 249.3 Section 249.3 Indians BUREAU... General Provisions § 249.3 Identification cards. (a) The Commissioner of Indian Affairs shall arrange for the issuance of an appropriate identification card to any Indian entitled thereto as prima...

  17. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Identification cards. 101.8 Section 101.8 Customs... GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that employee's photograph and signature, signed by the appropriate issuing officer....

  18. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Identification cards. 101.8 Section 101.8 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an appropriate identification card with that...

  19. Privacy-protected biometric templates: acoustic ear identification

    NASA Astrophysics Data System (ADS)

    Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.

    2004-08-01

    Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].

  20. Biometric template revocation

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  1. 19 CFR 101.8 - Identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Identification cards. 101.8 Section 101.8 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.8 Identification cards. Each Customs employee shall be issued an...

  2. Modeling of Biometric Identification System Using the Colored Petri Nets

    NASA Astrophysics Data System (ADS)

    Petrosyan, G. R.; Ter-Vardanyan, L. A.; Gaboutchian, A. V.

    2015-05-01

    In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The main objective of this paper is to introduce the fundamental concepts of Petri Nets to the researchers and practitioners, both from identification systems, who are involved in the work in the areas of modelling and analysis of biometric identification types of systems, as well as those who may potentially be involved in these areas. In addition, the paper introduces high-level Petri Nets, as Colored Petri Nets (CPN). In this paper the model of Colored Petri Net describes the identification process much simpler.

  3. European securitization and biometric identification: the uses of genetic profiling.

    PubMed

    Johnson, Paul; Williams, Robin

    2007-01-01

    The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. One significant source for this growth has been the "securitization" agendas of nation states that attempt the greater control and monitoring of population movement across geographical borders. Among the wide variety of available biometric schemes, DNA profiling is regarded as a key method for discerning and recording embodied individuality. This paper discusses the current limitations on the use of DNA profiling in civil identification practices and speculates on future uses of the technology with regard to its interoperability with other biometric databasing systems. PMID:17536152

  4. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  5. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  6. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  7. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  8. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  9. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  10. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  11. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  12. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  13. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  14. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Form of identification card. 112.43 Section 112.43... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued on Customs Form 3873 and shall not be valid unless signed by the employee...

  15. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  16. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  17. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  18. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  19. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Temporary identification cards. 112.49 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an identification card is required by the port director under § 112.41,...

  20. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Surrender of identification cards. 112.45 Section... OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be surrendered by the holder or licensee to the port...

  1. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Identification cards required. 112.41 Section 112... THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards... custody to carry and display upon request of a Customs officer an identification card issued by...

  2. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be issued...

  3. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall...

  4. Biometric Identification Using Holographic Radar Imaging Techniques

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.; Kennedy, Mike O.; Foote, Harlan P.

    2007-04-01

    Pacific Northwest National Laboratory researchers have been at the forefront of developing innovative screening systems to enhance security and a novel imaging system to provide custom-fit clothing using holographic radar imaging techniques. First-of-a-kind cylindrical holographic imaging systems have been developed to screen people at security checkpoints for the detection of concealed, body worn, non-metallic threats such as plastic and liquid explosives, knifes and contraband. Another embodiment of this technology is capable of obtaining full sized body measurements in near real time without the person under surveillance removing their outer garments. Radar signals readily penetrate clothing and reflect off the water in skin. This full body measurement system is commercially available for best fitting ready to wear clothing, which was the first “biometric” application for this technology. One compelling feature of this technology for security biometric applications is that it can see effectively through disguises, appliances and body hair.

  5. ECG biometric identification: A compression based approach.

    PubMed

    Bras, Susana; Pinho, Armando J

    2015-08-01

    Using the electrocardiogram signal (ECG) to identify and/or authenticate persons are problems still lacking satisfactory solutions. Yet, ECG possesses characteristics that are unique or difficult to get from other signals used in biometrics: (1) it requires contact and liveliness for acquisition (2) it changes under stress, rendering it potentially useless if acquired under threatening. Our main objective is to present an innovative and robust solution to the above-mentioned problem. To successfully conduct this goal, we rely on information-theoretic data models for data compression and on similarity metrics related to the approximation of the Kolmogorov complexity. The proposed measure allows the comparison of two (or more) ECG segments, without having to follow traditional approaches that require heartbeat segmentation (described as highly influenced by external or internal interferences). As a first approach, the method was able to cluster the data in three groups: identical record, same participant, different participant, by the stratification of the proposed measure with values near 0 for the same participant and closer to 1 for different participants. A leave-one-out strategy was implemented in order to identify the participant in the database based on his/her ECG. A 1NN classifier was implemented, using as distance measure the method proposed in this work. The classifier was able to identify correctly almost all participants, with an accuracy of 99% in the database used. PMID:26737619

  6. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  7. Body identification, biometrics and medicine: ethical and social considerations.

    PubMed

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny. PMID:17536154

  8. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  9. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  10. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  11. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  12. Biometric identification devices -- Laboratory testing vs. real life

    SciTech Connect

    Ahrens, J.S.

    1997-05-01

    For over fifteen years Sandia National Laboratories has been involved in laboratory testing of biometric identification devices. The key concept of biometric identification devices is the ability for the system to identify some unique aspect of the individual rather than some object a person may be carrying or some password they are required to know. Tests were conducted to verify manufacturer`s performance claims, to determine strengths/weaknesses of devices, and to determine devices that meet the US Department of energy`s needs. However, during recent field installation, significantly different performance was observed than was predicted by laboratory tests. Although most people using the device believed it operated adequately, the performance observed was over an order of magnitude worse than predicted. The search for reasons behind this gap between the predicted and the actual performance has revealed many possible contributing factors. As engineers, the most valuable lesson to be learned from this experience is the value of scientists and engineers with (1) common sense, (2) knowledge of human behavior, (3) the ability to observe the real world, and (4) the capability to realize the significant differences between controlled experiments and actual installations.

  13. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  14. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  15. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  16. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  17. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  18. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  19. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  20. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Northern Marianas identification card. 235... INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.9 Northern Marianas identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards...

  1. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Northern Marianas identification card. 1235... identification card. During the two-year period that ended July 1, 1990, the Service issued Northern Marianas Identification Cards to aliens who acquired United States citizenship when the Covenant to Establish...

  2. 19 CFR 112.49 - Temporary identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Temporary identification cards. 112.49 Section 112.49 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.49 Temporary identification cards. (a) Issuance. When an...

  3. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for...

  4. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Identification cards required. 112.41 Section 112.41 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may require each...

  5. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... published a proposed rule in the Federal Register (74 FR 48892) for a 60-day public comment period. The... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part 1254 RIN 3095-AB59 Researcher Identification Card AGENCY:...

  6. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border...

  7. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border...

  8. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism. PMID:20703779

  9. Facial recognition trial: biometric identification of non-compliant subjects using CCTV

    NASA Astrophysics Data System (ADS)

    Best, Tim

    2007-10-01

    LogicaCMG were provided with an opportunity to deploy a facial recognition system in a realistic scenario. 12 cameras were installed at an international airport covering all entrances to the immigration hall. The evaluation took place over several months with numerous adjustments to both the hardware (i.e. cameras, servers and capture cards) and software. The learning curve has been very steep but a stage has now been reached where both LogicaCMG and the client are confident that, subject to the right environmental conditions (lighting and camera location) an effective system can be defined with a high probability of successful detection of the target individual, with minimal false alarms. To the best of our knowledge, results with a >90% detection rate, of non-compliant subjects 'at range' has not been achieved anywhere else. This puts this location at the forefront of capability in this area. The results achieved demonstrate that, given optimised conditions, it is possible to achieve a long range biometric identification of a non compliant subject, with a high rate of success.

  10. Systems and methods for remote long standoff biometric identification using microwave cardiac signals

    NASA Technical Reports Server (NTRS)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2012-01-01

    Systems and methods for remote, long standoff biometric identification using microwave cardiac signals are provided. In one embodiment, the invention relates to a method for remote biometric identification using microwave cardiac signals, the method including generating and directing first microwave energy in a direction of a person, receiving microwave energy reflected from the person, the reflected microwave energy indicative of cardiac characteristics of the person, segmenting a signal indicative of the reflected microwave energy into a waveform including a plurality of heart beats, identifying patterns in the microwave heart beats waveform, and identifying the person based on the identified patterns and a stored microwave heart beats waveform.

  11. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  12. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  13. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  14. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card... may only issue a temporary or limited-term REAL ID driver's license or identification card to...

  15. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    PubMed Central

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar. PMID:16390976

  16. Ethical and social implications of biometric identification technology.

    PubMed

    Mordini, Emilio; Petrini, Carlo

    2007-01-01

    This paper discusses the social and ethical aspects of biometrics, using mainly a historical approach. A description is provided as regards the origins and development of the word. Reference is made to the various ways in which it has been interpreted, sometimes very different one from another, and finally to the meaning currently attached to it. The most relevant ethical and social implications are highlighted by giving a brief overview of the contents of the main institutional documents produced both on an international and domestic level in the various countries. The analyses contained in these reports also bring to the fore the main challenges which society shall have to deal with, in the near future and on a long-term basis, as a consequence of the extremely rapid diffusion of those technologies which use biometric data request. PMID:17536148

  17. Methods for using a biometric parameter in the identification of persons

    DOEpatents

    Hively, Lee M.

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  18. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  19. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  20. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false U.S. Citizen Identification Card. 235.10... OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards...

  1. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    NASA Astrophysics Data System (ADS)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  2. Dynamic biometric identification from multiple views using the GLBP-TOP method.

    PubMed

    Wang, Yu; Shen, Xuanjing; Chen, Haipeng; Zhai, Yujie

    2014-01-01

    To realize effective and rapid dynamic biometric identification with low computational complexity, a video-based facial texture program that extracts local binary patterns from three orthogonal planes in the frequency domain of the Gabor transform (GLBP-TOP) was proposed. Firstly, each normalized face was transformed by Gabor wavelet to get the enhanced Gabor magnitude map, and then the LBP-TOP operator was applied to the maps to extract video texture. Finally, weighted Chi square statistics based on the Fisher Criterion were used to realize the identification. The proposed algorithm was proved effective through the biometric experiments using the Honda/UCSD database, and was robust against changes of illumination and expressions. PMID:25226976

  3. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  4. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  5. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  6. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false U.S. Citizen Identification Card. 1235.10... Card. (a) General. Form I-197, U.S. Citizen Identification Card, is no longer issued by the Service but valid existing cards will continue to be acceptable documentation of U.S. citizenship. Possession of...

  7. Protection of Biometric Information

    NASA Astrophysics Data System (ADS)

    Kevenaar, Tom

    The field of biometrics is concerned with recognizing individuals by means of unique physiological or behavioral characteristics. In practical systems, several biometric modalities are used, such as fingerprint, face, iris, hand geometry, and so forth. Recently, biometric systems are becoming increasingly popular because they potentially offer more secure solutions than other identification means such as PIN codes and security badges because a biometric is tightly linked to an individual. For the same reason, biometrics can prevent the use of several identities by a single individual. Finally, biometrics are also more convenient because, unlike passwords and PIN codes, they cannot be forgotten and are always at hand.

  8. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    NASA Astrophysics Data System (ADS)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  9. Resting State EEG-based biometrics for individual identification using convolutional neural networks.

    PubMed

    Lan Ma; Minett, James W; Blu, Thierry; Wang, William S-Y

    2015-08-01

    Biometrics is a growing field, which permits identification of individuals by means of unique physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra-personal differences and large inter-personal differences between individuals' brainwave patterns. In the past, such methods have used features derived from manually-designed procedures for this purpose. Another possibility is to use convolutional neural networks (CNN) to automatically extract an individual's best and most unique neural features and conduct classification, using EEG data derived from both Resting State with Open Eyes (REO) and Resting State with Closed Eyes (REC). Results indicate that this CNN-based joint-optimized EEG-based Biometric System yields a high degree of accuracy of identification (88%) for 10-class classification. Furthermore, rich inter-personal difference can be found using a very low frequency band (0-2Hz). Additionally, results suggest that the temporal portions over which subjects can be individualized is less than 200 ms. PMID:26736885

  10. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  11. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  12. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  13. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  14. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  15. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  16. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  17. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  18. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  19. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  20. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Revocation or suspension of identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards. (a) Grounds for revocation or suspension of...

  1. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  2. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  3. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Identification card or document in... Vehicle Operators § 930.112 Identification card or document in possession. The operator or incidental operator will have a valid agency identification card or document (e.g., building pass or credential)...

  4. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... WATERFRONT FACILITIES OR VESSELS § 125.13 Captain of the Port Identification Cards. Captain of the Port Identification Cards issued under the form designation “Form CG 2514” prior to the revision of August 1950...

  5. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Changes in information on identification cards... SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards. Where there has been a change in the name, address,...

  6. 19 CFR 112.48 - Revocation or suspension of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Revocation or suspension of identification cards. 112.48 Section 112.48 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.48 Revocation or suspension of identification cards....

  7. 19 CFR 112.44 - Changes in information on identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Changes in information on identification cards. 112.44 Section 112.44 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.44 Changes in information on identification cards....

  8. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.9 Northern...

  9. The application of a biometric identification technique for linking community and hospital data in rural Ghana

    PubMed Central

    Odei-Lartey, Eliezer Ofori; Boateng, Dennis; Danso, Samuel; Kwarteng, Anthony; Abokyi, Livesy; Amenga-Etego, Seeba; Gyaase, Stephaney; Asante, Kwaku Poku; Owusu-Agyei, Seth

    2016-01-01

    Background The reliability of counts for estimating population dynamics and disease burdens in communities depends on the availability of a common unique identifier for matching general population data with health facility data. Biometric data has been explored as a feasible common identifier between the health data and sociocultural data of resident members in rural communities within the Kintampo Health and Demographic Surveillance System located in the central part of Ghana. Objective Our goal was to assess the feasibility of using fingerprint identification to link community data and hospital data in a rural African setting. Design A combination of biometrics and other personal identification techniques were used to identify individual's resident within a surveillance population seeking care in two district hospitals. Visits from resident individuals were successfully recorded and categorized by the success of the techniques applied during identification. The successes of visits that involved identification by fingerprint were further examined by age. Results A total of 27,662 hospital visits were linked to resident individuals. Over 85% of those visits were successfully identified using at least one identification method. Over 65% were successfully identified and linked using their fingerprints. Supervisory support from the hospital administration was critical in integrating this identification system into its routine activities. No concerns were expressed by community members about the fingerprint registration and identification processes. Conclusions Fingerprint identification should be combined with other methods to be feasible in identifying community members in African rural settings. This can be enhanced in communities with some basic Demographic Surveillance System or census information. PMID:26993473

  10. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  11. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  12. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  13. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  14. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  15. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Beneficiary Identification Cards and verification... Cards and verification of tribal membership. (a) The Indian Health Service will issue Beneficiary Identification Cards as evidence of beneficiary status to persons who are currently eligible for services...

  16. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Restrictions on the use of identification cards. 2... on the use of identification cards. No person may require any patient to carry on his or her person while away from the program premises any card or other object which would identify the patient as...

  17. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Physical security features for the driver's license or identification card. 37.15 Section 37.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements §...

  18. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  19. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  20. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  1. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  2. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Renewal of REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a)...

  3. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  4. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  5. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Reissued REAL ID driver's licenses and... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a)...

  6. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Renewal of REAL ID driver's licenses and identification cards. 37.25 Section 37.25 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal...

  7. 6 CFR 37.21 - Temporary or limited-term driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Temporary or limited-term driver's licenses and identification cards. 37.21 Section 37.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements §...

  8. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Reissued REAL ID driver's licenses and identification cards. 37.23 Section 37.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued...

  9. Biometric identification of capillariid eggs from archaeological sites in Patagonia.

    PubMed

    Taglioretti, V; Fugassa, M H; Beltrame, M O; Sardella, N H

    2014-06-01

    Numerous eggs of capillariid nematodes have been found in coprolites from a wide range of hosts and in raptor pellets in archaeological samples from Patagonia. The structure and sculpture of the eggshell of these nematodes and their biometry are commonly used for identification. The aim of this study was to determine whether eggs of the genus Calodium with similar morphology, found in different archaeological samples from Patagonia, belong to the same species. For this purpose, capillariid eggs (N= 843) with thick walls and radial striations were studied by permutational multivariate analysis of variance (PERMANOVA). Eggs exhibiting similar shape and structure also showed similar biometry, regardless of the zoological origin of coprolites (P= 0.84), host diet (P= 0.19), character of the archaeological sites (P= 0.67) and chronology (P= 0.66). Thus, they were attributed to the same species. We suggest that an unidentified zoonotic species of the genus Calodium occurred in the digestive tract of a wide range of hosts in Patagonia during the Holocene and that both human and animal populations were exposed to this parasite during the Holocene in the study area. PMID:23388621

  10. FLIR biometrics

    NASA Astrophysics Data System (ADS)

    O'Kane, Barbara L.; Krzywicki, Alan T.

    2009-04-01

    Biometrics are generally thought of as anatomical features that allow positive identification of a person. This paper describes biometrics that are also physiological in nature. The differences between anatomy and physiology have to do with the fact that physiology is dynamic, functioning, and changing with the state or actions of a person whereas anatomy is generally more stable. Biometrics in general usually refers to a trait, whereas the new type of biometrics discussed in this paper refer to a state, which is temporary, and often even transitory. By state, what is meant is the condition of a person at a particular time relative to their psychological, physical, medical, or physiological status. The present paper describes metrics that are cues to the state of a functioning individual observable through a thermal camera video system. An inferred state might then be tied to the positive identification of the person. Using thermal for this purpose is significant because the thermal signature of a human is dynamic and changes with physical and emotional state, while also revealing underlying anatomical structures. A new method involving the counting of open pores on the skin is discussed as a way of observing the Electrodermal Activity (EDA) of the skin, a primary component of the polygraph.

  11. 48 CFR 652.204-70 - Department of State Personal Identification Card Issuance Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Personal Identification Card Issuance Procedures. 652.204-70 Section 652.204-70 Federal Acquisition... Provisions and Clauses 652.204-70 Department of State Personal Identification Card Issuance Procedures. As prescribed in 604.1301-70, insert the following clause: Department of State Personal Identification...

  12. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these..., OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation... identification card. For the machine readable portion of the REAL ID driver's license or identification...

  13. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  14. Transformation of hand-shape features for a biometric identification approach.

    PubMed

    Travieso, Carlos M; Briceño, Juan Carlos; Alonso, Jesús B

    2012-01-01

    The present work presents a biometric identification system for hand shape identification. The different contours have been coded based on angular descriptions forming a Markov chain descriptor. Discrete Hidden Markov Models (DHMM), each representing a target identification class, have been trained with such chains. Features have been calculated from a kernel based on the HMM parameter descriptors. Finally, supervised Support Vector Machines were used to classify parameters from the DHMM kernel. First, the system was modelled using 60 users to tune the DHMM and DHMM_kernel+SVM configuration parameters and finally, the system was checked with the whole database (GPDS database, 144 users with 10 samples per class). Our experiments have obtained similar results in both cases, demonstrating a scalable, stable and robust system. Our experiments have achieved an upper success rate of 99.87% for the GPDS database using three hand samples per class in training mode, and seven hand samples in test mode. Secondly, the authors have verified their algorithms using another independent and public database (the UST database). Our approach has reached 100% and 99.92% success for right and left hand, respectively; showing the robustness and independence of our algorithms. This success was found using as features the transformation of 100 points hand shape with our DHMM kernel, and as classifier Support Vector Machines with linear separating functions, with similar success. PMID:22368506

  15. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false U.S. Citizen Identification Card. 235.10 Section 235.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form...

  16. 8 CFR 235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false U.S. Citizen Identification Card. 235.10 Section 235.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 235.10 U.S. Citizen Identification Card. (a) General. Form...

  17. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  18. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  19. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  20. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  1. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184...

  2. 77 FR 60134 - Agency Information Collection Activities; Application for Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Federal Register (77 FR 42753) on June 20, 2012, allowing for a 60-day comment period. This notice allows... Identification Card AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day... accordance with the Paperwork Reduction Act: Application for ] Identification Card (CBP Form 3078). This is...

  3. 42 CFR 2.18 - Restrictions on the use of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Restrictions on the use of identification cards. 2.18 Section 2.18 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.18 Restrictions on the use of identification cards....

  4. EEG biometric identification: a thorough exploration of the time-frequency domain

    NASA Astrophysics Data System (ADS)

    DelPozo-Banos, Marcos; Travieso, Carlos M.; Weidemann, Christoph T.; Alonso, Jesús B.

    2015-10-01

    Objective. Although interest in using electroencephalogram (EEG) activity for subject identification has grown in recent years, the state of the art still lacks a comprehensive exploration of the discriminant information within it. This work aims to fill this gap, and in particular, it focuses on the time-frequency representation of the EEG. Approach. We executed qualitative and quantitative analyses of six publicly available data sets following a sequential experimentation approach. This approach was divided in three blocks analysing the configuration of the power spectrum density, the representation of the data and the properties of the discriminant information. A total of ten experiments were applied. Main results. Results show that EEG information below 40 Hz is unique enough to discriminate across subjects (a maximum of 100 subjects were evaluated here), regardless of the recorded cognitive task or the sensor location. Moreover, the discriminative power of rhythms follows a W-like shape between 1 and 40 Hz, with the central peak located at the posterior rhythm (around 10 Hz). This information is maximized with segments of around 2 s, and it proved to be moderately constant across montages and time. Significance. Therefore, we characterize how EEG activity differs across individuals and detail the optimal conditions to detect subject-specific information. This work helps to clarify the results of previous studies and to solve some unanswered questions. Ultimately, it will serve as guide for the design of future biometric systems.

  5. Random patterns and biometrics for counterfeit deterrence

    SciTech Connect

    Tolk, K.M.

    1993-12-31

    Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. The resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.

  6. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost. PMID:25371272

  7. [On the use of the spectral speech characteristics for the determination of biometric parameters of the vocal tract in forensic medical identification of the speaker's personality].

    PubMed

    Kaganov, A Sh

    2014-01-01

    The objective of the present study was to elucidate the relationship between the spectral speech characteristics and the biometric parameters of the speaker's vocal tract. The secondary objective was to consider the theoretical basis behind the medico-criminalistic personality identification from the biometric parameters of the speaker's vocal tract. The article is based on the results of real forensic medical investigations and the literature data. PMID:25275181

  8. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification

    PubMed Central

    Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-01-01

    Introduction The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. Aim To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. Materials and Methods The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier’s caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson’s coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Results Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. Conclusion The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations. PMID:27437349

  9. Teaching Number Identification to Students with Severe Disabilities Using Response Cards

    ERIC Educational Resources Information Center

    Skibo, Holly; Mims, Pamela; Spooner, Fred

    2011-01-01

    Active student responding (ASR) has been shown to be an effective way to improve the mathematical skills of students. One specific method of ASR is the use of response cards. In this study, a system of least prompts combined with response cards was used to increase mathematical knowledge, and number identification, of three elementary students…

  10. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Driver's licenses and identification cards issued during the age-based enrollment period. 37.27 Section 37.27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card...

  11. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  12. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  13. MALDI-TOF MS versus VITEK 2 ANC card for identification of anaerobic bacteria

    PubMed Central

    Li, Yang; Gu, Bing; Xia, Wenying; Fan, Kun; Mei, Yaning; Huang, Peijun; Pan, Shiyang

    2014-01-01

    Background Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) is an accurate, rapid and inexpensive technique that has initiated a revolution in the clinical microbiology laboratory for identification of pathogens. The Vitek 2 anaerobe and Corynebacterium (ANC) identification card is a newly developed method for identification of corynebacteria and anaerobic species. The aim of this study was to evaluate the effectiveness of the ANC card and MALDI-TOF MS techniques for identification of clinical anaerobic isolates. Methods Five reference strains and a total of 50 anaerobic bacteria clinical isolates comprising ten different genera and 14 species were identified and analyzed by the ANC card together with Vitek 2 identification system and Vitek MS together with version 2.0 database respectively. 16S rRNA gene sequencing was used as reference method for accuracy in the identification. Results Vitek 2 ANC card and Vitek MS provided comparable results at species level for the five reference strains. Of 50 clinical strains, the Vitek MS provided identification for 46 strains (92%) to the species level, 47 (94%) to genus level, one (2%) low discrimination, two (4%) no identification and one (2%) misidentification. The Vitek 2 ANC card provided identification for 43 strains (86%) correct to the species level, 47 (94%) correct to the genus level, three (6%) low discrimination, three (6%) no identification and one (2%) misidentification. Conclusions Both Vitek MS and Vitek 2 ANC card can be used for accurate routine clinical anaerobe identification. Comparing to the Vitek 2 ANC card, Vitek MS is easier, faster and more economic for each test. The databases currently available for both systems should be updated and further developed to enhance performance. PMID:24822113

  14. Biometric verification with correlation filters.

    PubMed

    Vijaya Kumar, B V K; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-10

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification. PMID:14735958

  15. Biometric verification with correlation filters

    NASA Astrophysics Data System (ADS)

    Vijaya Kumar, B. V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification.

  16. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border crossing... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... expedited removal in accordance with 8 CFR part 235, the applicant shall be advised in writing that he...

  17. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 22 CFR 41.122, a Form DSP-150 or combined B-1/B-2 visitor visa and non-biometric border crossing... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... expedited removal in accordance with 8 CFR part 235, the applicant shall be advised in writing that he...

  18. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... apply for a new card as provided for in the DOS regulations found at 22 CFR 41.32 and 22 CFR 41.103. ... Application, to obtain a Form DSP-150 in accordance with the applicable DOS regulations at 22 CFR 41.32 and/or... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person...

  19. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    PubMed

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed. PMID:27309026

  20. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  1. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  2. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  3. 6 CFR 37.27 - Driver's licenses and identification cards issued during the age-based enrollment period.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... described in § 37.5. Effective December 1, 2014, Federal agencies will only accept REAL ID cards for... 1, 2014, must obtain and present REAL ID cards for official purposes by December 1, 2017....

  4. 33 CFR 125.13 - Captain of the Port Identification Cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Captain of the Port Identification Cards. 125.13 Section 125.13 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) WATERFRONT FACILITIES IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR VESSELS § 125.13...

  5. Micro secure digital card: A novel method for denture identification

    PubMed Central

    Colvenkar, Shreya S.; Gopal, Sujatha

    2014-01-01

    Aim: Denture labeling is of vital significance in social and forensic scenario. Numerous published work have attempted to present best method for denture marking, however not all satisfy crucial requirement either in terms of cost or storage of large amount of information. Hence, this paper describes a simple, cheap, and feasible denture marking system using portable Micro Secure Digital (MicroSD) card. These cards are created to store, modify, and view large amount of information with mobile phones, which forms an important part in majority of household in India. Materials and Methods: After try-in make a depression slightly wider than the size of the MicroSD card on the external lingual flange of the trial mandibular denture. Process the denture together with acrylic wax flap according to manufacturer's instructions. The acrylic flap is planned in such a way that it is well-flushed with surrounding areas and can be lifted on one side to access the card. MicroSD card is placed in the denture and flap is closed. Conclusion: The proposed method is simple, cheap, and can store large amount of information. PMID:25177141

  6. Explosives trace detection in the process of biometrical fingerprint identification for access control

    NASA Astrophysics Data System (ADS)

    Bertseva, Elena V.; Savin, Andrey V.

    2007-02-01

    A method for trace detection of explosives on the surface of biometric fingerprint scanner is proposed and its sensitivity explored. The method is based on attenuated total reflection mid-infrared spectroscopy. The detection limit is about several microgram and the detectivity increases with the wavelength used for scanning. The advantages of the proposed method include high selectivity and thus low false alarm level, applicability to low vapor pressure explosives and low cost.

  7. Body, biometrics and identity.

    PubMed

    Mordini, Emilio; Massari, Sonia

    2008-11-01

    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, narratives and meanings. Certainly there are reasons for the ethical and political concerns surrounding biometrics but these reasons are probably quite different from those usually alleged. PMID:18959731

  8. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  9. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  10. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  11. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Validity periods and deadlines for REAL ID... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a)...

  12. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Validity periods and deadlines for REAL ID driver's licenses and identification cards. 37.5 Section 37.5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID...

  13. Anatomy of Biometric Passports

    PubMed Central

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  14. Anatomy of biometric passports.

    PubMed

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  15. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued...

  16. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  17. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  18. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  19. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified...

  20. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... satisfactory to the Indian Health Service of tribal membership and residence within a Health Service Delivery... 42 Public Health 1 2011-10-01 2011-10-01 false Beneficiary Identification Cards and verification of tribal membership. 136a.16 Section 136a.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT...

  1. State-Issued Identification Cards Reveal Patterns in Adult Weight Status

    PubMed Central

    Morris, Daniel S.; Main, Eric C.; Harris, Jenine K.; Moland, Abraham; Cude, Curtis

    2015-01-01

    Background: State-issued identification cards are a promising data source for neighborhood-level obesity estimates. Methods: We used information from three million Oregon state-issued identification cards to compute age-adjusted estimates of average adult body mass index (BMI) for each census tract in the state. We used multivariate linear regression to identify associations between weight status and population characteristics, food access, commuting behavior, and geography. Results: Together, home values, education, race, ethnicity, car commuting, and rural-urban commuting area (RUCA) explained 86% of the variation in BMI among tracts. BMI was lower in areas with higher home values and greater educational attainment, and higher in areas with more workers commuting by car. Discussion: Our findings are consistent with other research on socioeconomic disparities in obesity. This demonstrates state-issued identification cards are a promising data source for BMI surveillance and may offer new insight into the association between weight status and economic and environmental factors. Public health agencies should explore options for developing their own obesity estimates from identification card data. PMID:26062036

  2. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 1235.10 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.10 U.S. Citizen Identification... Card is void if the person to whom it was issued admits in a statement signed before an...

  3. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  4. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  5. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  6. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  7. 47 CFR 101.215 - Posting of station authorization and transmitter identification cards, plates, or signs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Posting of station authorization and transmitter identification cards, plates, or signs. 101.215 Section 101.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES...

  8. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Restrictions on the use of identification cards and public signs. 1.467 Section 1.467 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS GENERAL PROVISIONS Release of Information from Department of Veterans Affairs (va) Records Relating to Drug...

  9. 77 FR 42753 - Agency Information Collection Activities: Application for Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ...As part of its continuing effort to reduce paperwork and respondent burden, CBP invites the general public and other Federal agencies to comment on an information collection requirement concerning the Application for Identification Card (CBP Form 3078). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995 (Pub. L....

  10. 42 CFR 136a.16 - Beneficiary Identification Cards and verification of tribal membership.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Beneficiary Identification Cards and verification of tribal membership. 136a.16 Section 136a.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH What Services Are Available and Who Is Eligible...

  11. 36 CFR 1254.10 - For how long and where is my researcher identification card valid?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false For how long and where is my researcher identification card valid? 1254.10 Section 1254.10 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS General Information §...

  12. 5 CFR 930.112 - Identification card or document in possession.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Identification card or document in possession. 930.112 Section 930.112 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PROGRAMS FOR SPECIFIC POSITIONS AND EXAMINATIONS (MISCELLANEOUS) Motor Vehicle Operators § 930.112...

  13. Improving the recognition of fingerprint biometric system using enhanced image fusion

    NASA Astrophysics Data System (ADS)

    Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma

    2010-04-01

    Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.

  14. Review of modern biometric user authentication and their development prospects

    NASA Astrophysics Data System (ADS)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  15. Campus Card Tricks.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1999-01-01

    Examines the development of an innovative student identification card system that includes off-campus banking and credit card functions. Finding solutions to bank objections, credit card company rule problems, and software difficulties are discussed. (GR)

  16. 3D combinational curves for accuracy and performance analysis of positive biometrics identification

    NASA Astrophysics Data System (ADS)

    Du, Yingzi; Chang, Chein-I.

    2008-06-01

    The receiver operating characteristic (ROC) curve has been widely used as an evaluation criterion to measure the accuracy of biometrics system. Unfortunately, such an ROC curve provides no indication of the optimum threshold and cost function. In this paper, two kinds of 3D combinational curves are proposed: the 3D combinational accuracy curve and the 3D combinational performance curve. The 3D combinational accuracy curve gives a balanced view of the relationships among FAR (false alarm rate), FRR (false rejection rate), threshold t, and Cost. Six 2D curves can be derived from the 3D combinational accuracy curve: the conventional 2D ROC curve, 2D curve of (FRR, t), 2D curve of (FAR, t), 2D curve of (FRR, Cost), 2D curve of (FAR, Cost), and 2D curve of ( t, Cost). The 3D combinational performance curve can be derived from the 3D combinational accuracy curve which can give a balanced view among Security, Convenience, threshold t, and Cost. The advantages of using the proposed 3D combinational curves are demonstrated by iris recognition systems where the experimental results show that the proposed 3D combinational curves can provide more comprehensive information of the system accuracy and performance.

  17. Modular biometric system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Viazanko, Michael; O'Looney, Jimmy; Szu, Harold

    2009-04-01

    Modularity Biometric System (MBS) is an approach to support AiTR of the cooperated and/or non-cooperated standoff biometric in an area persistent surveillance. Advanced active and passive EOIR and RF sensor suite is not considered here. Neither will we consider the ROC, PD vs. FAR, versus the standoff POT in this paper. Our goal is to catch the "most wanted (MW)" two dozens, separately furthermore ad hoc woman MW class from man MW class, given their archrivals sparse front face data basis, by means of various new instantaneous input called probing faces. We present an advanced algorithm: mini-Max classifier, a sparse sample realization of Cramer-Rao Fisher bound of the Maximum Likelihood classifier that minimize the dispersions among the same woman classes and maximize the separation among different man-woman classes, based on the simple feature space of MIT Petland eigen-faces. The original aspect consists of a modular structured design approach at the system-level with multi-level architectures, multiple computing paradigms, and adaptable/evolvable techniques to allow for achieving a scalable structure in terms of biometric algorithms, identification quality, sensors, database complexity, database integration, and component heterogenity. MBS consist of a number of biometric technologies including fingerprints, vein maps, voice and face recognitions with innovative DSP algorithm, and their hardware implementations such as using Field Programmable Gate arrays (FPGAs). Biometric technologies and the composed modularity biometric system are significant for governmental agencies, enterprises, banks and all other organizations to protect people or control access to critical resources.

  18. A lightweight approach for biometric template protection

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  19. Performances of VITEK 2 Colorimetric Cards for Identification of Gram-Positive and Gram-Negative Bacteria

    PubMed Central

    Wallet, Frédéric; Loïez, Caroline; Renaux, Emilie; Lemaitre, Nadine; Courcol, René J.

    2005-01-01

    Thepurpose of this study was to evaluate the new VITEK 2 identification cards that use colorimetric reading to identify gram-positive and gram-negative bacteria (GP and GN cards, respectively) in comparison to fluorimetric cards (ID-GPC and ID-GNB, respectively). A total of 580 clinical isolates and stock collection strains belonging to 116 taxa were included in the study. Of the 249 gram-positive strains tested with both the ID-GPC and GP cards, 218 (87.5%) and 235 (94.4%) strains were correctly identified (to the genus and species level), respectively. Of the 331 gram-negative strains tested with the ID-GNB and GN cards, 295 (89.1%) and 321 (97%) strains were correctly identified, respectively. Another focus of the study was to apply the percentages of correct identifications obtained in this study to the list of bacteria isolated in our laboratory (32,739 isolates) in the year 2004. We obtained 97.9% correct identifications with the colorimetric cards and 93.9% with fluorescent cards. PMID:16145083

  20. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    NASA Astrophysics Data System (ADS)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  1. Biometrics for electronic health records.

    PubMed

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment. PMID:20703610

  2. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  3. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  4. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  5. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  6. 6 CFR 37.71 - Driver's licenses and identification cards issued under section 202(d)(11) of the REAL ID Act.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... issued under section 202(d)(11) of the REAL ID Act. 37.71 Section 37.71 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Driver's Licenses and Identification Cards Issued Under section 202(d)(11) of the REAL ID Act § 37.71...

  7. 7 CFR 274.10 - Use of identification cards and redemption of coupons by eligible households.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... household's issuance. In areas not designated by FNS as requiring Photo ID cards, the ID card shall contain... same envelope with authorization documents or coupons. (b) Photo ID cards. (1) Photo ID cards shall be... beginning of each fiscal year of any areas that either require or no longer require the use of Photo...

  8. Efficient search and retrieval in biometric databases

    NASA Astrophysics Data System (ADS)

    Mhatre, Amit J.; Palla, Srinivas; Chikkerur, Sharat; Govindaraju, Venu

    2005-03-01

    Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. Fingerprints, face and voice biometrics are being increasingly used as alternatives to passwords, PINs and visual verification. In spite of the rapid proliferation of large-scale databases, the research has thus far been focused only on accuracy within small databases. In larger applications, response time and retrieval efficiency also become important in addition to accuracy. Unlike structured information such as text or numeric data that can be sorted, biometric data does not have any natural sorting order. Therefore indexing and binning of biometric databases represents a challenging problem. We present results using parallel combination of multiple biometrics to bin the database. Using hand geometry and signature features we show that the search space can be reduced to just 5% of the entire database.

  9. 36 CFR 1254.6 - Do I need a researcher identification card to use archival materials at a NARA facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Do I need a researcher identification card to use archival materials at a NARA facility? 1254.6 Section 1254.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS...

  10. 36 CFR 1254.8 - What information do I need to provide when applying for a researcher identification card?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What information do I need to provide when applying for a researcher identification card? 1254.8 Section 1254.8 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL MATERIALS...

  11. New biometric modalities using internal physical characteristics

    NASA Astrophysics Data System (ADS)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  12. Biometric template transformation: a security analysis

    NASA Astrophysics Data System (ADS)

    Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.

    2010-01-01

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

  13. Identification of genetic variation and putative regulatory regions in bovine CARD15

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Mutations in caspase recruitment domain 15 (CARD15) are associated with susceptibility to Crohn's disease and Blau Syndrome. We performed comparative analyses of the bovine, murine, and human CARD15 transcripts to elucidate functionality of bovine CARD15 and examine its potential role in bovine dise...

  14. Recent research results in iris biometrics

    NASA Astrophysics Data System (ADS)

    Hollingsworth, Karen; Baker, Sarah; Ring, Sarah; Bowyer, Kevin W.; Flynn, Patrick J.

    2009-05-01

    Many security applications require accurate identification of people, and research has shown that iris biometrics can be a powerful identification tool. However, in order for iris biometrics to be used on larger populations, error rates in the iris biometrics algorithms must be as low as possible. Furthermore, these algorithms need to be tested in a number of different environments and configurations. In order to facilitate such testing, we have collected more than 100,000 iris images for use in iris biometrics research. Using this data, we have developed a number of techniques for improving recognition rates. These techniques include fragile bit masking, signal-level fusion of iris images, and detecting local distortions in iris texture. Additionally, we have shown that large degrees of dilation and long lapses of time between image acquisitions negatively impact performance.

  15. Biometric recognition via fixation density maps

    NASA Astrophysics Data System (ADS)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  16. Protein identification from dried nipple aspirate fluid on Guthrie cards using mass spectrometry.

    PubMed

    Delmonico, Lucas; Areias, Vivian Rabello; Pinto, Rodrigo César; Matos, Cintia Da Silva; Rosa, Marco Felipe Franco; De Azevedo, Carolina Maria; Alves, Gilda

    2015-07-01

    Nipple aspirate fluid (NAF) requires investigation as a potential source of biomarkers for early diagnosis or risk assessment in breast cancer and other breast disorders. The present study demonstrated that proteins were easily extracted from dried NAF spots on Guthrie cards and were suitable for mass spectrometry analysis. NAF was obtained from 80 women, collected on Guthrie cards, between 2007 and 2010. The NAF-proteins were extracted from the card by incubating the card in water. These proteins were then quantified and separated using one-dimensional, 12% SDS-PAGE, gel electrophoresis and on high-resolution gradient gels at different concentrations (4-12, 8-16 and 4-20%). The bands with the most abundant proteins were excised from the gradient gels and the proteins were identified by liquid chromatography quadrupole time of flight. Immunoglobulins, Zn-α2-glicoprotein, apoliprotein D and prolactin inducible protein were among those identified. The NAF-Guthrie card collection method has not been applied previously, however, NAF proteins have been identified using other collecting techniques, confirming the feasibility of the NAF Guthrie card collection method for analyzing the proteins within NAF. The NAF-Guthrie card collecting method has multiple advantages, including being inexpensive, non-invasive, reliable and painless, and the cards can be stored at room temperature. Examining NAF may assist in identifying individuals at a higher risk of breast cancer and in improving patient prognosis. PMID:25760982

  17. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Department of Defense (DoD) proposes to establish policy, assign responsibilities, and provide procedures for the issuing of distinct DoD ID cards. The ID cards shall be issued to uniformed service members, their dependents, and other eligible individuals and will be used as proof of identity and DoD...

  18. A MEMS-based, wireless, biometric-like security system

    NASA Astrophysics Data System (ADS)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  19. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  20. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  1. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George

    2013-01-01

    Hand-based biometric analysis systems and techniques provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an input image. Additionally, the analysis uses re-use of commonly seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  2. Corneal topography measurements for biometric applications

    NASA Astrophysics Data System (ADS)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  3. Mathematical and information maintenance of biometric systems

    NASA Astrophysics Data System (ADS)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  4. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... of transaction. (d) Date of birth. (e) Gender. (f) Address as listed on the card pursuant to §...

  5. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... 6 Domestic Security 1 2014-01-01 2014-01-01 false Machine readable technology on the driver's..., Verification, and Card Issuance Requirements § 37.19 Machine readable technology on the driver's license...

  6. 6 CFR 37.19 - Machine readable technology on the driver's license or identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of these... 6 Domestic Security 1 2013-01-01 2013-01-01 false Machine readable technology on the driver's..., Verification, and Card Issuance Requirements § 37.19 Machine readable technology on the driver's license...

  7. Biometrics and international migration.

    PubMed

    Redpath, Jillyanne

    2007-01-01

    This paper will focus on the impact of the rapid expansion in the use of biometric systems in migration management on the rights of individuals; it seeks to highlight legal issues for consideration in implementing such systems, taking as the starting point that the security interests of the state and the rights of the individual are not, and should not be, mutually exclusive. The first part of this paper briefly describes the type of biometric applications available, how biometric systems function, and those used in migration management. The second part examines the potential offered by biometrics for greater security in migration management, and focuses on developments in the use of biometrics as a result of September 11. The third part discusses the impact of the use of biometrics in the management of migration on the individual's right to privacy and ability to move freely and lawfully. The paper highlights the increasing need for domestic and international frameworks to govern the use of biometric applications in the migration/security context, and proposes a number of issues that such frameworks could address. PMID:17536151

  8. 3D face analysis for demographic biometrics

    SciTech Connect

    Tokola, Ryan A; Mikkilineni, Aravind K; Boehnen, Chris Bensing

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  9. On the Design of Forgiving Biometric Security Systems

    NASA Astrophysics Data System (ADS)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  10. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  11. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  12. Biometrics and Security

    NASA Astrophysics Data System (ADS)

    Govindaraju, Venu

    The science of Biometrics is concerned with recognizing people based on their physiological or behavioral characteristics. It has emerged as a vibrant field of research in today's security conscious society. In this talk we will introduce the important research challenges in Biometrics and specifically address the following topics: i) unobtrusive people tracking using a novel evolutionary recognition paradigm, ii) efficient indexing and searching of large fingerprint databases, iii) cancelability of templates where the task is to ensure that enrolled biometric templates can be revoked and new templates issued, and iv) fusion of fingerprints with other biometric modalities such as face where we will explore optimal trainable functions that operate on the scores returned by individual matchers.

  13. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  14. Live biometric authenticity check

    NASA Astrophysics Data System (ADS)

    Szu, Harold H.; Hsu, Charles C.; Szu, Clifford; Wang, Shoujue

    2003-04-01

    This research defined the underpinning concepts of a system that was highly secure, yet was efficient and non-invasive enough for everyday use. The live biometric authenticity check augmented invariant fingerprints with variable live features offered superior security by combining physical characteristics of the user"s with a passcode (numerical PIN) or passphrase (a string of words), and might also easily be augmented with other biometric video imaging devices for the utmost security.

  15. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  16. Identification of inorganic pigments used in porcelain cards based on fusing Raman and X-ray fluorescence (XRF) data.

    PubMed

    Deneckere, Annelien; de Vries, Lieke; Vekemans, Bart; Van de Voorde, Lien; Ariese, Freek; Vincze, Laszlo; Moens, Luc; Vandenabeele, Peter

    2011-11-01

    Raman spectroscopy and X-ray fluorescence (XRF) spectroscopy are often used as complementary techniques that are well suited for the analysis of art objects because both techniques are fast, sensitive, and noninvasive and measurements can take place in situ. In most of these studies, both techniques are used separately, in the sense that the spectra are evaluated independently and single conclusions are obtained, considering both results. This paper presents a data fusion procedure for Raman and XRF data for the characterization of pigments used in porcelain cards. For the classification of the analyzed points of the porcelain cards principal component analysis (PCA) was used. A first attempt was made to develop a new procedure for the identification of the pigments using a database containing the fused Raman-XRF data of 24 reference pigments. The results show that the classification based on the fused Raman-XRF data is significantly better than the classifications based on the Raman data or the XRF data separately. PMID:22054088

  17. Developing a multimodal biometric authentication system using soft computing methods.

    PubMed

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision. PMID:25502384

  18. Geometrical features of transformed phase masks in the optical/digital device for identification of credit cards

    NASA Astrophysics Data System (ADS)

    Muravsky, Leonid I.; Kulynych, Yaroslav P.; Maksymenko, Olexander P.; Voronyak, Taras I.; Kostyukevych, Sergey A.

    2002-04-01

    The new method for identification of optical marks containing transformed phase masks (TPMs) is considered. A TPM placed in an optical correlator produces several sharp correlation peaks on its output. We choose the distances between peaks as basic geometrical features of a TPM. The increase of quantity of basic features leads to the increase of security level of documents and valuable papers. However, the amount of such features is limited and is depending from many factors. We picked the probability of false identification of the nearest feature as the criterion of separation of features on independent classes. The optical/digital device for identification of credit cards based on a joint transform correlator architecture was used for the study of TPMs. To estimate the law of distribution of basic features inherent to the same class, we carried out experiments with the series of TPMs. We have shown, that the additional features allow to increase the number of basic features, separated on different classes. These experiments also have allowed to estimate the error of features measurements

  19. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  20. Improved reader for magnetically-encoded ID cards

    NASA Technical Reports Server (NTRS)

    Wu, T. T.

    1979-01-01

    Hybrid demodulator in electronic card reader for magnetically encoded identification cards, accommodates variations in insertion speeds, yet is simpler and less expensive than equivalent all-digital circuits.

  1. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  2. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  3. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  4. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the...

  5. Unconstrained and contactless hand geometry biometrics.

    PubMed

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices. PMID:22346634

  6. Extracting forensic evidence from biometric devices

    NASA Astrophysics Data System (ADS)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  7. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols. PMID:27462493

  8. Genetics, biometrics and the informatization of the body.

    PubMed

    van der Ploeg, Irma

    2007-01-01

    "Genetics" is a term covering a wide set of theories, practices, and technologies, only some of which overlap with the practices and technologies of biometrics. In this paper some current technological developments relating to biometric applications of genetics will be highlighted. Next, the author will elaborate the notion of the informatization of the body, by means of a brief philosophical detour on the dualisms of language and reality, words and things. In the subsequent sections she will then draw out some of the questions relevant to the purposes of Biometrics Identification Technology Ethics (BITE), and discuss the ethical problems associated with the informatization of the body. There are, however some problems and limitations to the currently dominant ethical discourse to deal with all things ethical in relation to information technology in general, and biometrics or genetics in particular. The final section will discuss some of these meta-problems. PMID:17536153

  9. Smart card multiple function badge

    SciTech Connect

    Nelson, R.A.

    1993-06-01

    Smart cards are credit card-sized computers with integrated data storage, an operating system to manage the data, and built-in security features that protect the data. They are used to distribute information to remote sites, providing the same or greater reliability, data integrity, and information security than a network system. However, smart cards may provide greater functionality at a lower cost than network systems. The US Department of Energy Hanford Site is developing the smart card to be used as a multiple function identification badge that will service various data management requirements on the Site. This paper discusses smart card technology and the proposed Hanford Site applications.

  10. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ...To implement DoD Instruction 8520.2, dated April 1, 2004, SDDC required all commercial accounts accessing transportation systems and applications to use a commercial PKI certificate or Transportation Workers Identification Credential (TWIC). TWIC does not meet DOD security standards and cannot be used as of January 29,...