Introduction
In this report i have chosen two organizations in Saudi Arabia that apply the fingerprint algorithm as a technology are the ITQAN and STC organizations.
‘ Fingerprint algorithm History
– 1823 – Professor Johannes Evangelist Purkinje discussed 9 fingerprint patterns
– 1856 – Sir William Hershel used fingerprint (in India) on contracts
– 1880 – Dr. Henry Faulds article in Nature about fingerprints for ID
– 1883 – Mark Twain’s Life on the Mississippi (murderer ID’ed by fingerprint)
– 1888 ‘ Sir Francis Galton developed classification system
o His system of ‘minutia’ still used today
o Also verified that fingerprints do not change
– Some countries require fixed number of ‘points’ (minutia) to match in criminal cases
o In Britain, at least 15 points
o In US, no fixed number of points
Figure1: Fingerprint: Enrollment
‘ Capture image of fingerprint
‘ Enhance image
‘ Identify points
Figure2: Fingerprint: Recognition
Extracted points are compared with information stored in a database
‘ ITQAN organization fingerprint efforts to develop one-to-one partnerships with their customers. Their dedicated representatives are assigned to specific accounts in order to better understand their customer’s priorities and business goals and manage them with the attention and responsiveness they require ITQAN Fingerprint delivers technical support from engineers who know and understand their customer’s needs and concerns. They promise to regard every request, no matter how large or small, as valuable and important.
‘ STC organization has announced recently for fingerprint identification , In line with new regulations from the Communications and Information Technology Commission to link the prepaid line to the owner’s fingerprint, now any saudi or resident person can visit one of their branches or authorized distributors to update his data and register his fingerprint, to continue using their offers and services.
State of the art literature review of the method
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.
Figure3: Fingerprint Technology
Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.
– ITQAN organization has made a significant effort forward in technology growth. ITQAN social responsibilities are just as important to financial success.
ITQAN fingerprint started in 2005, under Name if ITQAN International then we changed Our Trade name after we focus on Time Attendance and Door Access systems with Brands (Fingertec, Virdi, Suprema, IDTECK, ZKS, and YLI) to new Trade name (ITQAN Fingerprint Trading Est.) in Kingdom of Saudi Arabia in Eastern Province operated by group of Certified and qualified Engineers, with professional Technicians in field of networking, communication, and security system.
ITQAN look for additional opportunities in other KSA regions, then accordingly outside Saudi Arabia. ITQAN is a reliable supplier of high-quality products.
– Saudi Telecom Company “STC” organization began to implement authentication fingerprint service, to subscribers of mobile communication services, in line with the decision of telecommunications, information technology so special body, where he began the application of the mechanism in all its branches across the Kingdom for all new and existing customers. It confirms Saudi Telecom Company.
How fingerprint is implemented
In order to implement the fingerprint in any organization you must know how the architecture of fingerprint works in order to implement it on the specified organization.
– ITQAN organization fingerprint implemetation through dealing direct with several point to point factories located in Malaysia, Korea, Taiwan, Canada, and China, ITQAN built group of resellers over Kingdom of Saudi Arabia on the field of Biometric, Door Access Control, Networking Peripherals, CCTV and Security Systems, ITQAN offers a full sales and technical support for their resellers offered to Enterprise, Large, Medium, and small Companies.
– STC organization fingerprint implementation is applied by scanning the customer’s fingerprints to match them to NIC’s database. In order for a SIM to be activated it must match the fingerprints in the database. Any finger of the right or left hand can be used. No, fingerprints are required to activate a new line, change the SIM, change the number, transfer the ownership. fingerprints must be also submitted to update personal information, being the main identifier.
What type of Information Security they are using
The types of information security the two organizations are using are:
– ITQAN organization uses fingerprint to secure information inside the organizations in Saudi Arabia , using Security Systems that apply the finger print in their environment.
– STC organization uses fingerprint to secure information specified for both Saudi people and residents by scanning the customer’s fingerprints to match them to NIC’s database.
Conclusion
At last , this report has introduced the fingerprint algorithm and its implementation in two organizations are : ITQAN & STC . These organizations uses their methods in order to secure their information using the fingerprint algorithm and Technology.
It’s increasingly difficult today to cost-effectively manage an organization in the face of rapidly changing technology. Today’s decisions have far reaching implications for any organization’s ability to compete in tomorrow’s advanced technology business environment.
References
[1] http://www.stc.com.sa/wps/wcm/connect/tagalog/individual/static/fingerprint
[2] https://en.wikipedia.org/wiki/Fingerprint_recognition
[3] http://www.itqan.com.sa/
–