Introduction | p. 1 |
Introduction | p. 2 |
Identity Verification in Animals and Humans | p. 2 |
The Use of Biometrics by Ancient Civilisations | p. 4 |
Early Pioneers in Anatomical Measurement | p. 5 |
Franz Joseph Gall (1758-1828) | p. 5 |
Cesare Lombrosco (1836-1909) | p. 6 |
Adolphe Quetelet (1796-1874) | p. 7 |
Alphonse Bertillon (1853-1914) | p. 8 |
Jan Evangelista Purkyne (1787-1868) | p. 9 |
Juan Vucetich (1858-1925) | p. 10 |
Francis Galton (1822-1911) | p. 10 |
Modem Times | p. 12 |
Review Questions | p. 13 |
Biometrics Revisited | p. 15 |
Biometrics Defined | p. 15 |
Assumptions | p. 17 |
Biometric Methodologies | p. 18 |
Hand Geometry | p. 19 |
Voice Verification | p. 19 |
Signature Verification | p. 19 |
Keystroke Dynamics | p. 20 |
Fingerprint Recognition | p. 20 |
Retinal Scanning | p. 21 |
Iris Recognition | p. 21 |
Face Recognition | p. 22 |
Gait Recognition | p. 23 |
Vein Scanning | p. 23 |
Other Techniques | p. 23 |
Which Biometric Is Best? | p. 24 |
Physical Access Control | p. 24 |
Time and Attendance Monitoring | p. 25 |
Logical Access Control | p. 25 |
On-line Transactions | p. 26 |
Portable Device Access | p. 26 |
National Identity Documentation | p. 27 |
Border Control | p. 27 |
Benefit Claims | p. 28 |
Industrial Processes | p. 28 |
Other Applications | p. 28 |
Considerations Around DNA | p. 29 |
Review Questions | p. 30 |
Biometric Systems Defined | p. 31 |
Introduction | p. 31 |
Early Days | p. 32 |
Rudimentary Integration | p. 33 |
System Components | p. 34 |
Peripheral Architectures | p. 35 |
Review Questions | p. 37 |
Identity Management | p. 39 |
What Is an Identity? | p. 39 |
The Concept of Identity Management Within Systems | p. 40 |
Identity Credentials | p. 41 |
The Alignment of Credentials with User Profiles | p. 42 |
Data Management | p. 44 |
Role-Based Identity Management | p. 46 |
Review Questions | p. 48 |
True Systems Integration | p. 49 |
Systems Definition | p. 50 |
Pertinent Systems Components | p. 52 |
The Registration Process | p. 52 |
The Operational Process | p. 53 |
Biometric Credential Storage | p. 55 |
Portable Media | p. 55 |
Portable Devices | p. 56 |
Remote Databases | p. 56 |
Biometric Matching Process | p. 57 |
Systems and Data Security | p. 59 |
Infrastructure Security | p. 59 |
Data Security | p. 60 |
Biometric Sub-system Security | p. 61 |
Scalability | p. 62 |
Audit Logging | p. 63 |
Data Synchronisation | p. 64 |
System Interfaces | p. 65 |
Network Considerations | p. 66 |
Systems Testing | p. 67 |
Software | p. 67 |
Third Party Software | p. 68 |
Hardware | p. 68 |
Operational Process | p. 69 |
End-to-End Testing | p. 69 |
Conclusion | p. 70 |
Review Questions | p. 71 |
Performance Issues | p. 73 |
Introduction | p. 74 |
Defining Performance | p. 74 |
Measuring Performance | p. 75 |
Biometric Capture | p. 75 |
The Biometric Matching Process | p. 75 |
Integration of the Biometric Transaction | p. 77 |
Database Performance | p. 79 |
Network Performance | p. 81 |
Operator Performance | p. 83 |
System Throughput | p. 83 |
Documenting Performance | p. 84 |
System Variables | p. 85 |
User Variables | p. 86 |
Usability | p. 86 |
Familiarity | p. 87 |
Competence | p. 87 |
Attitude | p. 88 |
External Influence | p. 89 |
Disabilities | p. 89 |
Language | p. 90 |
Age | p. 91 |
Ethnicity | p. 92 |
Well-being | p. 92 |
Systems Configuration | p. 93 |
Total Systems Performance | p. 94 |
Review Questions | p. 95 |
Equivalence of Performance | p. 97 |
Defining Equivalence of Performance | p. 98 |
Why Equivalence of Performance Is Important | p. 98 |
From the Operator's Perspective | p. 98 |
From the User's Perspective | p. 99 |
Facilitating Equivalence of Performance | p. 100 |
Managing Equivalence of Performance | p. 106 |
Security Considerations | p. 106 |
Systems Integration | p. 107 |
Reporting on Equivalence of Performance | p. 108 |
Architecture | p. 108 |
Individual Node Performance | p. 108 |
System-Wide Performance | p. 109 |
Alerts | p. 109 |
Configuration | p. 109 |
Next Steps | p. 110 |
Review Questions | p. 111 |
Aligning Biometrics with Data | p. 113 |
Introduction | p. 114 |
What Does a Biometric Check Prove? | p. 114 |
The Registration Process | p. 115 |
Associated Data Records | p. 118 |
Access to Information | p. 120 |
Verifying Information | p. 121 |
Information Security | p. 122 |
Data Protection and Privacy | p. 124 |
Review Questions | p. 125 |
The Mobile World | p. 127 |
Introduction | p. 127 |
A Technology Explosion | p. 128 |
Functionality | p. 129 |
Personal Identification | p. 130 |
Application Catch-Up | p. 131 |
Mobile Futures | p. 132 |
Review Questions | p. 132 |
Human Factors | p. 133 |
Introduction | p. 134 |
User Psychology | p. 134 |
Age | p. 135 |
Ethnicity | p. 137 |
Health | p. 138 |
Disabilities | p. 139 |
Variability | p. 140 |
Human Factors and Operational Performance | p. 141 |
Shyness and the Self-conscious User | p. 142 |
The Under Protest User | p. 142 |
The Technical Sceptic User | p. 143 |
The Late Arrival User | p. 144 |
The Tired User | p. 144 |
The User on Medication | p. 145 |
The Angry User | p. 146 |
The User with Something to Hide | p. 147 |
The Disabled User | p. 147 |
Inherited Behaviour | p. 148 |
Human Rights Issues | p. 149 |
A Biometric Constitution | p. 150 |
The Biometric Constitution: A First Draft | p. 150 |
Conclusion | p. 155 |
Review Questions | p. 155 |
The Politics | p. 157 |
Introduction | p. 157 |
Politics and Technology | p. 158 |
The Supply Chain | p. 158 |
Roles and Responsibilities | p. 159 |
Law Enforcement | p. 161 |
Terrorism and Serious Crime | p. 163 |
Scope Creep | p. 166 |
Societal Development | p. 167 |
Review Questions | p. 168 |
The Future | p. 169 |
Introduction | p. 170 |
Trends | p. 170 |
Intelligence and Identity Management | p. 170 |
Virtualisation and the Cloud | p. 172 |
Online Services | p. 174 |
Mobile Technology | p. 176 |
Service Industries | p. 177 |
Systems Design | p. 179 |
Technology Usage | p. 181 |
Challenges | p. 182 |
Complexity | p. 183 |
Security | p. 184 |
Ownership | p. 185 |
Verification and Trust | p. 186 |
Identity Theft | p. 187 |
Review Questions | p. 188 |
Epilogue | p. 189 |
Index | p. 193 |
Table of Contents provided by Ingram. All Rights Reserved. |