Investigation and management solution for privacy identification and electrical energy theft

This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), whi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kannan, A., Krishnan, A. S., Krishnan, S. M., Bindu, K. V., Rabi, B. J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 77
container_issue
container_start_page 73
container_title
container_volume
creator Kannan, A.
Krishnan, A. S.
Krishnan, S. M.
Bindu, K. V.
Rabi, B. J.
description This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.
doi_str_mv 10.1109/ICECCT.2011.6077073
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6077073</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6077073</ieee_id><sourcerecordid>6077073</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-d93d6b8d77076f993a83d53f667660a3946baa2423e610ccc67776f4611cd15d3</originalsourceid><addsrcrecordid>eNpFUNFKxDAQjIignvcF95IfaE2adNM8Sjm1cOBLH4Ujl2xqpJdKGw_691Y9uHlZdmZ3GIaQDWc550w_NvW2rtu8YJznwJRiSlyRey5LpXilpby-LGVxS9bT9MkWAOhCwR15b-IJpxQ6k8IQqYmOHk00HR4xJjoN_fcf74eRfo3hZOxMg1uk4IO9vGCPNo0L01OMOHYzTR_o0wO58aafcH2eK9I-b9v6Ndu9vTT10y4LmqXMaeHgULnf7OC1FqYSrhQeQAEwI7SEgzGFLAQCZ9ZaUGo5lMC5dbx0YkU2_7YBEfdLzKMZ5_25DPEDL2FU5g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Investigation and management solution for privacy identification and electrical energy theft</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</creator><creatorcontrib>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</creatorcontrib><description>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</description><identifier>ISBN: 1457718952</identifier><identifier>ISBN: 9781457718953</identifier><identifier>EISBN: 1457718944</identifier><identifier>EISBN: 1457718936</identifier><identifier>EISBN: 9781457718946</identifier><identifier>EISBN: 9781457718939</identifier><identifier>DOI: 10.1109/ICECCT.2011.6077073</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automated Fingerprint Identification System ; Biometric Identification System ; Fingerprint recognition ; Fingers ; Fraud Investigation Tool ; Government ; PRIMS-Privacy Identification and Management Solutions ; Privacy ; Security</subject><ispartof>2011 International Conference on Electronics, Communication and Computing Technologies, 2011, p.73-77</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6077073$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6077073$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kannan, A.</creatorcontrib><creatorcontrib>Krishnan, A. S.</creatorcontrib><creatorcontrib>Krishnan, S. M.</creatorcontrib><creatorcontrib>Bindu, K. V.</creatorcontrib><creatorcontrib>Rabi, B. J.</creatorcontrib><title>Investigation and management solution for privacy identification and electrical energy theft</title><title>2011 International Conference on Electronics, Communication and Computing Technologies</title><addtitle>ICECCT</addtitle><description>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</description><subject>Automated Fingerprint Identification System</subject><subject>Biometric Identification System</subject><subject>Fingerprint recognition</subject><subject>Fingers</subject><subject>Fraud Investigation Tool</subject><subject>Government</subject><subject>PRIMS-Privacy Identification and Management Solutions</subject><subject>Privacy</subject><subject>Security</subject><isbn>1457718952</isbn><isbn>9781457718953</isbn><isbn>1457718944</isbn><isbn>1457718936</isbn><isbn>9781457718946</isbn><isbn>9781457718939</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUNFKxDAQjIignvcF95IfaE2adNM8Sjm1cOBLH4Ujl2xqpJdKGw_691Y9uHlZdmZ3GIaQDWc550w_NvW2rtu8YJznwJRiSlyRey5LpXilpby-LGVxS9bT9MkWAOhCwR15b-IJpxQ6k8IQqYmOHk00HR4xJjoN_fcf74eRfo3hZOxMg1uk4IO9vGCPNo0L01OMOHYzTR_o0wO58aafcH2eK9I-b9v6Ndu9vTT10y4LmqXMaeHgULnf7OC1FqYSrhQeQAEwI7SEgzGFLAQCZ9ZaUGo5lMC5dbx0YkU2_7YBEfdLzKMZ5_25DPEDL2FU5g</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Kannan, A.</creator><creator>Krishnan, A. S.</creator><creator>Krishnan, S. M.</creator><creator>Bindu, K. V.</creator><creator>Rabi, B. J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Investigation and management solution for privacy identification and electrical energy theft</title><author>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-d93d6b8d77076f993a83d53f667660a3946baa2423e610ccc67776f4611cd15d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Automated Fingerprint Identification System</topic><topic>Biometric Identification System</topic><topic>Fingerprint recognition</topic><topic>Fingers</topic><topic>Fraud Investigation Tool</topic><topic>Government</topic><topic>PRIMS-Privacy Identification and Management Solutions</topic><topic>Privacy</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kannan, A.</creatorcontrib><creatorcontrib>Krishnan, A. S.</creatorcontrib><creatorcontrib>Krishnan, S. M.</creatorcontrib><creatorcontrib>Bindu, K. V.</creatorcontrib><creatorcontrib>Rabi, B. J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kannan, A.</au><au>Krishnan, A. S.</au><au>Krishnan, S. M.</au><au>Bindu, K. V.</au><au>Rabi, B. J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Investigation and management solution for privacy identification and electrical energy theft</atitle><btitle>2011 International Conference on Electronics, Communication and Computing Technologies</btitle><stitle>ICECCT</stitle><date>2011-09</date><risdate>2011</risdate><spage>73</spage><epage>77</epage><pages>73-77</pages><isbn>1457718952</isbn><isbn>9781457718953</isbn><eisbn>1457718944</eisbn><eisbn>1457718936</eisbn><eisbn>9781457718946</eisbn><eisbn>9781457718939</eisbn><abstract>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</abstract><pub>IEEE</pub><doi>10.1109/ICECCT.2011.6077073</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1457718952
ispartof 2011 International Conference on Electronics, Communication and Computing Technologies, 2011, p.73-77
issn
language eng
recordid cdi_ieee_primary_6077073
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Automated Fingerprint Identification System
Biometric Identification System
Fingerprint recognition
Fingers
Fraud Investigation Tool
Government
PRIMS-Privacy Identification and Management Solutions
Privacy
Security
title Investigation and management solution for privacy identification and electrical energy theft
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T12%3A42%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Investigation%20and%20management%20solution%20for%20privacy%20identification%20and%20electrical%20energy%20theft&rft.btitle=2011%20International%20Conference%20on%20Electronics,%20Communication%20and%20Computing%20Technologies&rft.au=Kannan,%20A.&rft.date=2011-09&rft.spage=73&rft.epage=77&rft.pages=73-77&rft.isbn=1457718952&rft.isbn_list=9781457718953&rft_id=info:doi/10.1109/ICECCT.2011.6077073&rft_dat=%3Cieee_6IE%3E6077073%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457718944&rft.eisbn_list=1457718936&rft.eisbn_list=9781457718946&rft.eisbn_list=9781457718939&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6077073&rfr_iscdi=true