Home > Essay examples > Unlock Adv. Security with ITQAN & STC: Fingerprint Index Intro & Review

Essay: Unlock Adv. Security with ITQAN & STC: Fingerprint Index Intro & Review

Essay details and download:

  • Subject area(s): Essay examples
  • Reading time: 3 minutes
  • Price: Free download
  • Published: 5 December 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 915 (approx)
  • Number of pages: 4 (approx)

Text preview of this essay:

This page of the essay has 915 words.



Al Imam Mohammad Ibn Saud Islamic University

College of Computer and Information Sciences

Information Systems Department

Course Title: Information Security

 STC  &  ITQAN

Index

‘ Cover ‘……………………1

‘ Introduction to the organization and the method used ”..4

‘ State of the art literature review of the method ‘.6

‘ How fingerprint is implemented’8

‘ What type of Information Security they are using”.9

‘ Conclusion’10

‘ References’11

TABLE OF FIGURES

‘ Figure1: Fingerprint: Enrollment’….’4

‘ Figure2: Fingerprint: Recognition”..5

‘ Figure3: Fingerprint Technology’6

Key World

‘ NICs : National Information Center Saudi

‘ SIM : Subscriber Identity Module

‘ CCTV : Closed Circuit Television

Table of Contents

Introduction

In this report  i have chosen two organizations in Saudi Arabia that apply the fingerprint algorithm as a technology are the ITQAN and STC organizations.

‘ Fingerprint algorithm History

– 1823 –  Professor Johannes Evangelist Purkinje discussed 9 fingerprint patterns

– 1856  –  Sir William Hershel used fingerprint (in India) on contracts

– 1880 –  Dr. Henry Faulds article in Nature about fingerprints for ID

– 1883 –  Mark Twain’s Life on the Mississippi (murderer ID’ed by fingerprint)

– 1888 ‘ Sir Francis Galton developed classification system

o His system  of ‘minutia’ still used today

o Also verified that fingerprints do not change

– Some countries require fixed number of ‘points’ (minutia) to match in criminal cases

o In Britain, at least 15 points

o In US, no fixed number of points

Figure1: Fingerprint: Enrollment

‘ Capture image of fingerprint

‘ Enhance image

‘ Identify points

Figure2: Fingerprint: Recognition

Extracted points are compared with information stored in a database

‘ ITQAN organization fingerprint efforts to develop one-to-one partnerships with their customers. Their dedicated representatives are assigned to specific accounts in order to better understand their customer's priorities and business goals and manage them with the attention and responsiveness they require ITQAN Fingerprint delivers technical support from engineers who know and understand their customer's needs and concerns. They promise to regard every request, no matter how large or small, as valuable and important.

‘ STC organization has announced recently for fingerprint identification , In line with new regulations from the Communications and Information Technology Commission to link the prepaid line to the owner's fingerprint, now any  saudi or resident person  can visit one of their branches or authorized distributors to update his data and register his fingerprint, to continue using their offers and services.

State of the art literature review of the method

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.

Figure3: Fingerprint Technology

Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.

– ITQAN organization has made a significant effort forward in technology growth. ITQAN social responsibilities are just as important to financial success.

ITQAN fingerprint started in 2005, under Name if ITQAN International then we changed Our Trade name after we focus on Time Attendance and Door Access systems with Brands (Fingertec, Virdi, Suprema, IDTECK, ZKS, and YLI) to new Trade name (ITQAN Fingerprint Trading Est.) in Kingdom of Saudi Arabia in Eastern Province operated by group of Certified and qualified Engineers, with professional Technicians in field of networking, communication, and security system.

ITQAN  look for additional opportunities in other KSA regions, then accordingly outside Saudi Arabia. ITQAN is a reliable supplier of high-quality products.

– Saudi Telecom Company "STC" organization began to implement authentication fingerprint service, to subscribers of mobile communication services, in line with the decision of telecommunications, information technology so special body, where he began the application of the mechanism in all its branches across the Kingdom for all new and existing customers. It confirms Saudi Telecom Company.

How fingerprint is implemented

In order to implement the fingerprint in any organization you must know how the architecture of fingerprint works in order to implement it on the specified organization.

– ITQAN organization fingerprint implemetation through dealing direct with several point to point factories located in Malaysia, Korea, Taiwan, Canada, and China, ITQAN built group of resellers over Kingdom of Saudi Arabia on the field of Biometric, Door Access Control, Networking Peripherals, CCTV and Security Systems, ITQAN offers a full sales and technical support for their resellers offered to Enterprise, Large, Medium, and small Companies.

– STC organization fingerprint implementation is applied by scanning the customer’s fingerprints to match them to NIC’s database. In order for a SIM to be activated it must match the fingerprints in the database. Any finger of the right or left hand can be used. No, fingerprints are required to activate a new line, change the SIM, change the number, transfer the ownership. fingerprints must be also submitted to update personal information, being the main identifier.

What type of Information Security they are using

The types of information security the two organizations are using are:

– ITQAN  organization uses fingerprint to secure information inside the organizations in Saudi Arabia , using Security Systems that apply the finger print  in their environment.

– STC organization uses fingerprint to secure information specified for both Saudi people  and residents by scanning the customer’s fingerprints to match them to NIC’s database.

Conclusion

At last , this report has introduced the fingerprint algorithm and its implementation in two organizations are : ITQAN & STC . These organizations uses their methods in order to secure their information using the fingerprint algorithm and  Technology.

It's increasingly difficult today to cost-effectively manage an organization in the face of rapidly changing technology. Today's decisions have far reaching implications for any organization's ability to compete in tomorrow's advanced technology business environment.

References

[1] http://www.stc.com.sa/wps/wcm/connect/tagalog/individual/static/fingerprint

[2] https://en.wikipedia.org/wiki/Fingerprint_recognition

[3] http://www.itqan.com.sa/

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Unlock Adv. Security with ITQAN & STC: Fingerprint Index Intro & Review. Available from:<https://www.essaysauce.com/essay-examples/essay-2016-12-28-000cac/> [Accessed 16-04-26].

These Essay examples have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.

NB: Our essay examples category includes User Generated Content which may not have yet been reviewed. If you find content which you believe we need to review in this section, please do email us: essaysauce77 AT gmail.com.