Multi-fingerprint Response System
Multi-fingerprint
Multiple encryption
Data blinding
Emergency
Central server
Cache server
SMS interactive
IVR
Voice authentication
Fingerprint reader
USSD
Hierarchical fingerprint
See details on PDF file: https://goo.gl/gg5r8f
Innovative approach:
Multi-fingerprint standard
Multiple fingerprinting system relies on the use of several fingerprints per person as a tool for identification and authentication (according to the required purpose and level of security) for all individuals and institutions in the country
Authentication mechanism via custom finger reader device:
1. Optical fingerprint scanning, reading and extraction of characteristics and distinctive features of the fingerprint inside the device
2 - accurate optical scan of skin
3 - thermal sensor fingerprint (to make sure it is a vital fingerprint and not fake)
4. Calculate the exact geometry of the fingerprint (and translate it as a fingerprint code) to speed up the fingerprint recognition process by the server
Data security System
First: multiple encryption
Incomplete Encryption: A process of encryption via three encryption codes sent across 3 different communication channels
layer Encryption: An extra encryption layer for encrypted data from the server (which prevents data recognition if one layer is decrypted)
Segmented encryption: A process of fragmenting data (to be disclosed) into multiple parts, each part of which is encrypted with a different code
Second: Display texts in the form of an image and not texts
Third: No data is permanently deleted on the central server throughout the person's life cycle, but data is modified in the form of additional update layers (versions)
Fourth: Data is saved in 3 different formats (depending on the server)
Fifth: Data are saved to individuals outside the state in an independent dedicated server
The mechanism of data access by the server
Emergency security system
Which allows immediate switching between the two systems in the event of a collective intrusion of devices and servers (and disable the first system)
Data blinding system
All data is displayed in a blind values (expressed value rather than actual value) according to four levels of security
(Which prevents the use of data in case of misuse and access)
Data exchange system on the server
Central server: the server dedicated to save all data in a complete form, which is the mind controlling the process of recall of data to the person and determine the level of security required data by the requesting party and the service required
Admin server: A server that stores and groups fragmented databases
cache server: The server that is intended to display the data to be disclosed (temporarily)
Multi - service response system
Fingerprinting system with fingerprint reader devices (without technological knowledge)
Two way SMS interactive response
Voice system (self-forecasting) via (IVR)
Voice authentication system
Voice authentication is used as an authentication tool (for higher levels of security)
The system generates authentication questions from person's database
Allowing easy authentication without saving any numbers
The system replaces questions with each authentication request
Security Confirmation System
Replace the Bio fingerprint
Fingerprint reader for authentication:
USSD standard (via mobile network)
Addressing low-connection environments
Extensibility
Plug & Play system
Hierarchical fingerprint system (upper-level fingerprint originates lower-level fingerprints)
See details on PDF file: https://goo.gl/gg5r8f
- Idea
Innovative approach:
The system is characterized by the adoption of the fingerprint as a tool for identification and authentication of all individuals and institutions in the country
According to innovative privacy protection standards that are defined as follows:
Multi-fingerprint standard as defined levels (according to required purpose and level of insurance)
USSD standard for transmission (for request) and coverage for low communication environments
Standard (Blinding) of data
Security Leveling Criteria for Data Access (4 levels)
Confidentiality standard (national number), PIN and random identification numbers
Standard Devices and Communication (SIM)
Emergency security standard
Multiple encryption standard
Central server and response systems
See details on PDF file: https://goo.gl/gg5r8f
See details on PDF file: https://goo.gl/gg5r8f
Plug & Play system
The system makes it easy for all individuals and companies to use hardware, dedicated server capacity, pre-installed systems, access to services & server
Only a device /authentication devices & Internet connection are required to connect to server immediately & choose what they want (without need to design any systems or technological knowledge)
The system allows complete or partial automation of any governmental or private entity (through the use of the fingerprint authentication system and central server for a specific financial or administrative path within organization, without having to full automation that can be expanded in the future)
See details on PDF file: https://goo.gl/gg5r8f
See details on PDF file: https://goo.gl/gg5r8f
Extensibility
The system is characterized by the following:
Great ease of handling (via fingerprint devices for authentication)
Fast voice and text response system and prediction mechanisms from the server
Customized databases on the server (with the ability to link to the organization's databases)
Prefabricated software systems are available to third parties to deal with the various services you wish to provide (with the possibility to design their own systems for services using only system software)
- Other (Please explain below)
- Other (Please explain below)
- 1-5
- Less than 1 year
Noticeable
Any obstacles to the implementation of the project, which the arbitration team sees (from its perspective), I have solutions to overcome them.
