Investigation and management solution for privacy identification and electrical energy theft
This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), whi...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 77 |
---|---|
container_issue | |
container_start_page | 73 |
container_title | |
container_volume | |
creator | Kannan, A. Krishnan, A. S. Krishnan, S. M. Bindu, K. V. Rabi, B. J. |
description | This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics. |
doi_str_mv | 10.1109/ICECCT.2011.6077073 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6077073</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6077073</ieee_id><sourcerecordid>6077073</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-d93d6b8d77076f993a83d53f667660a3946baa2423e610ccc67776f4611cd15d3</originalsourceid><addsrcrecordid>eNpFUNFKxDAQjIignvcF95IfaE2adNM8Sjm1cOBLH4Ujl2xqpJdKGw_691Y9uHlZdmZ3GIaQDWc550w_NvW2rtu8YJznwJRiSlyRey5LpXilpby-LGVxS9bT9MkWAOhCwR15b-IJpxQ6k8IQqYmOHk00HR4xJjoN_fcf74eRfo3hZOxMg1uk4IO9vGCPNo0L01OMOHYzTR_o0wO58aafcH2eK9I-b9v6Ndu9vTT10y4LmqXMaeHgULnf7OC1FqYSrhQeQAEwI7SEgzGFLAQCZ9ZaUGo5lMC5dbx0YkU2_7YBEfdLzKMZ5_25DPEDL2FU5g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Investigation and management solution for privacy identification and electrical energy theft</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</creator><creatorcontrib>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</creatorcontrib><description>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</description><identifier>ISBN: 1457718952</identifier><identifier>ISBN: 9781457718953</identifier><identifier>EISBN: 1457718944</identifier><identifier>EISBN: 1457718936</identifier><identifier>EISBN: 9781457718946</identifier><identifier>EISBN: 9781457718939</identifier><identifier>DOI: 10.1109/ICECCT.2011.6077073</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automated Fingerprint Identification System ; Biometric Identification System ; Fingerprint recognition ; Fingers ; Fraud Investigation Tool ; Government ; PRIMS-Privacy Identification and Management Solutions ; Privacy ; Security</subject><ispartof>2011 International Conference on Electronics, Communication and Computing Technologies, 2011, p.73-77</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6077073$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6077073$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kannan, A.</creatorcontrib><creatorcontrib>Krishnan, A. S.</creatorcontrib><creatorcontrib>Krishnan, S. M.</creatorcontrib><creatorcontrib>Bindu, K. V.</creatorcontrib><creatorcontrib>Rabi, B. J.</creatorcontrib><title>Investigation and management solution for privacy identification and electrical energy theft</title><title>2011 International Conference on Electronics, Communication and Computing Technologies</title><addtitle>ICECCT</addtitle><description>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</description><subject>Automated Fingerprint Identification System</subject><subject>Biometric Identification System</subject><subject>Fingerprint recognition</subject><subject>Fingers</subject><subject>Fraud Investigation Tool</subject><subject>Government</subject><subject>PRIMS-Privacy Identification and Management Solutions</subject><subject>Privacy</subject><subject>Security</subject><isbn>1457718952</isbn><isbn>9781457718953</isbn><isbn>1457718944</isbn><isbn>1457718936</isbn><isbn>9781457718946</isbn><isbn>9781457718939</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUNFKxDAQjIignvcF95IfaE2adNM8Sjm1cOBLH4Ujl2xqpJdKGw_691Y9uHlZdmZ3GIaQDWc550w_NvW2rtu8YJznwJRiSlyRey5LpXilpby-LGVxS9bT9MkWAOhCwR15b-IJpxQ6k8IQqYmOHk00HR4xJjoN_fcf74eRfo3hZOxMg1uk4IO9vGCPNo0L01OMOHYzTR_o0wO58aafcH2eK9I-b9v6Ndu9vTT10y4LmqXMaeHgULnf7OC1FqYSrhQeQAEwI7SEgzGFLAQCZ9ZaUGo5lMC5dbx0YkU2_7YBEfdLzKMZ5_25DPEDL2FU5g</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Kannan, A.</creator><creator>Krishnan, A. S.</creator><creator>Krishnan, S. M.</creator><creator>Bindu, K. V.</creator><creator>Rabi, B. J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Investigation and management solution for privacy identification and electrical energy theft</title><author>Kannan, A. ; Krishnan, A. S. ; Krishnan, S. M. ; Bindu, K. V. ; Rabi, B. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-d93d6b8d77076f993a83d53f667660a3946baa2423e610ccc67776f4611cd15d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Automated Fingerprint Identification System</topic><topic>Biometric Identification System</topic><topic>Fingerprint recognition</topic><topic>Fingers</topic><topic>Fraud Investigation Tool</topic><topic>Government</topic><topic>PRIMS-Privacy Identification and Management Solutions</topic><topic>Privacy</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kannan, A.</creatorcontrib><creatorcontrib>Krishnan, A. S.</creatorcontrib><creatorcontrib>Krishnan, S. M.</creatorcontrib><creatorcontrib>Bindu, K. V.</creatorcontrib><creatorcontrib>Rabi, B. J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kannan, A.</au><au>Krishnan, A. S.</au><au>Krishnan, S. M.</au><au>Bindu, K. V.</au><au>Rabi, B. J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Investigation and management solution for privacy identification and electrical energy theft</atitle><btitle>2011 International Conference on Electronics, Communication and Computing Technologies</btitle><stitle>ICECCT</stitle><date>2011-09</date><risdate>2011</risdate><spage>73</spage><epage>77</epage><pages>73-77</pages><isbn>1457718952</isbn><isbn>9781457718953</isbn><eisbn>1457718944</eisbn><eisbn>1457718936</eisbn><eisbn>9781457718946</eisbn><eisbn>9781457718939</eisbn><abstract>This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the "Resolve Duplicate" process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication/authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.</abstract><pub>IEEE</pub><doi>10.1109/ICECCT.2011.6077073</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457718952 |
ispartof | 2011 International Conference on Electronics, Communication and Computing Technologies, 2011, p.73-77 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6077073 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Automated Fingerprint Identification System Biometric Identification System Fingerprint recognition Fingers Fraud Investigation Tool Government PRIMS-Privacy Identification and Management Solutions Privacy Security |
title | Investigation and management solution for privacy identification and electrical energy theft |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T12%3A42%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Investigation%20and%20management%20solution%20for%20privacy%20identification%20and%20electrical%20energy%20theft&rft.btitle=2011%20International%20Conference%20on%20Electronics,%20Communication%20and%20Computing%20Technologies&rft.au=Kannan,%20A.&rft.date=2011-09&rft.spage=73&rft.epage=77&rft.pages=73-77&rft.isbn=1457718952&rft.isbn_list=9781457718953&rft_id=info:doi/10.1109/ICECCT.2011.6077073&rft_dat=%3Cieee_6IE%3E6077073%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457718944&rft.eisbn_list=1457718936&rft.eisbn_list=9781457718946&rft.eisbn_list=9781457718939&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6077073&rfr_iscdi=true |