隐私识别与电能盗窃调查管理解决方案

A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi
{"title":"隐私识别与电能盗窃调查管理解决方案","authors":"A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi","doi":"10.1109/ICECCT.2011.6077073","DOIUrl":null,"url":null,"abstract":"This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"333 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Investigation and management solution for privacy identification and electrical energy theft\",\"authors\":\"A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi\",\"doi\":\"10.1109/ICECCT.2011.6077073\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.\",\"PeriodicalId\":158960,\"journal\":{\"name\":\"2011 International Conference on Electronics, Communication and Computing Technologies\",\"volume\":\"333 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Electronics, Communication and Computing Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCT.2011.6077073\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Electronics, Communication and Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT.2011.6077073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文讨论了一个系统来确定一个给定的人的身份请求是否存在。检查是通过比较申请人属性(签名除外)和注册数据库来执行的。在生物特征资料的搜寻方面,生物特征识别系统(BIS),即自动指纹识别系统(AFIS)数据库,是根据在申请记录上捕获的生物特征资料进行搜寻的。如果匹配的记录已经存在,或者存在一些部分匹配的记录,那么应用程序处理将被路由到“Resolve Duplicate”流程。欺诈调查应用程序建立在隐私识别和管理解决方案(PRIMS)框架上,该框架基于身份识别和认证解决方案。该解决方案的结构是实时捕获个人身份和生物特征数据,并立即检查个人身份,并使用该框架制作电子身份证和护照。PRIMS框架支持身份管理,如人员登记和申请处理、身份验证、安全文件制作和卡片库存控制、发放和发放后管理、服务点的认证/授权。PRIMS框架是用灵活的、基于组件的、面向服务的体系结构构建的。PRIMS框架集成了管理注册人员端到端生命周期和保护文件所需的许多功能。PRIMS提供了一个高度可配置的工作流和业务规则引擎,并允许显著的可变性,以支持注册处理领域的独特客户需求、安全文档的不同技术、不同的解决方案和生物识别技术的使用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Investigation and management solution for privacy identification and electrical energy theft
This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
VLSI implementation of sorting network for ACSFD in WSN Developing Application Specific Integrated Circuits(ASIC) for cloud computing Comprehensive analysis of delay in UDSM CMOS circuits Eye features normalization and face emotion detection for human face recognition Pseudo-orthogonal signature sequences for fiber optic CDMA LAN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1