Identification Technology Partners Identity Management- banner image | IDTP
IDENTITY

Identity Management and Biometric Expertise

Identity is IDTP's core business. Our deep understanding of identity-related technologies, specifically smart cards and biometrics, is essential to providing specialized services and expert consulting to our clients. IDTP is founded on the industry-leading biometric and credentialing expertise of our identity professionals.

Biometrics and Forensics

  • Biometric data processing

    : biometric system data processing including capture, quality assessment, presentation attack (spoof) detection, feature extraction, database enrollment, fusion, matching, and decision processes
  • Biometric sensors and hardware

    : variation and types of biometric sensors and technology (e.g. capacitive, thermal, optical, infrared, multi-spectrum) required to capture high-quality samples for various modalities and applications
  • Biometric system integration

    : the hardware and software interfacing necessary to produce a functioning biometric system optimized for a specific application, including proper utilization of biometric software development kits
  • Biometric system performance

    : system performance and metrics including Equal Error Rate (EER), False Accept Rate (FAR), False Reject Rate (FRR), False Match Rate (FMR), False Non-Match Rate (FNMR), detection error tradeoff (DET) and receiver operating characteristic (ROC) curves, Genuine and Impostor score histograms, and considerations for threshold optimization for population, operating environment, and application requirements
  • Biometric standards

    : ANSI, INCITS, NIST, ISO standards related to biometric data file formats, biometric data interchange, biometric application profiles, and biometric performance testing (learn about our standards support)
  • Forensic science and investigation

    : use of biometric technology to identify individuals in large-database applications such as automated fingerprint identification systems (AFIS) and automated biometric identification systems (ABIS)
  • Enrollment and capture processes

    : considerations for enrollment and live capture processes and errors such as failure to acquire (FTA) and failure to enroll (FTE)
  • Sample quality

    : biometric sample quality has a direct measurable impact on the performance of the system; proper quality assessment algorithms and thresholds ensure the integrity of enrolled biometric templates
  • Spoofing and presentation attack detection

    : recognizing and preventing attempts to use manufactured or fake biometric samples (also known as liveness detection)
  • Verification and Identification

    : verification processes require a one-to-one comparison between biometric samples to make a matching decision, while identification processes require one-to-many matching, where a sample (probe) is compared to a database (gallery) to obtain a ranked candidate list
  • Physiological and behavioral modalities

    : biometric traits (i.e. fingerprint, face, iris, voice, vascular, DNA) and their characteristics of universality, uniqueness, permanence, measurability, performance, acceptability, and circumvention
  • Soft biometrics

    : height, weight, skin color, scars, marks, tattoos
  • Multimodal biometrics

    : combining (or fusing) biometric traits to improve decision accuracy, hinder spoofing, and account for unavailability of biometric traits

Identity Credentials

Identity in Society: Secure Access, Personal Privacy, and Legal Concerns

  • Privacy and Legal

    : personally identifiable information (PII), misuse of data, human subject testing, collection and storage, consent, and ethics
  • Usability and Accessibility

    : considerations for the wide variation, availability, and permanence of human characteristics and biometric traits among large populations to provide intuitive and accommodating system design
  • Health and safety

    : personal health and hygiene considerations from interacting with devices, proper safety design for identity-based systems
  • Deployment

    : the broad use of identity systems in society presents the need for careful analysis of the risks and challenges associated with diverse use-cases and applications