What is BII™?

Biometric Identification Infrastructure, or BII™ for short, is a Multi-Factor Authentication System (MFA). BII™ is a comprehensive architecture that allows different applications using a variety of authentication methods to share a common set of data for each person in a centralized database.

 

BII™ is completely modular and allows customers to specify what sort of information will be stored and how it will be gathered. There is no need to be concerned if systems will inter-operate with each other since BII™ will handle communication between all of these disparate pieces over a standards-based architecture.

     

Unlike other systems, which can only use a single set of identifiers and data about an individual, BII™ systems can enter and manage multiple types of biometric and non-biometric data in a single record.

 

BII™ ™ allows customers the ability to consolidate their data, and makes it easy to reduce duplication, fraud, or other activities which can easily occur in single system solutions.

Why do I need it?

Utilizing a flexible architecture, BII™ can store and process a variety of biometric data including but not limited to fingerprint, palm print, facial, iris, hand geometry, etc. New forms of biometric identification can be quickly adapted for use with the system.

BII™ can accomplish the above while also keeping all data in a centralized database accessible by all of its applications. This allows entities and governments to cross check and access information from any system without losing track of an individual.

Expandability and flexibility being chief feature of BII™, it can be rapidly adapted to incorporate other applications as the need arises. For example, if a customer already has BII™ the following applications of AFIS, Voter Registration System, National ID, Census system and other civil applications could be a simple expansion of the existing system. Not only would the expansion be seamless, it provides the new application with a dataset that is ready to go.

How does it work?

BII™ is a robust framework that allows multiple applications to access a unified set of biometric and biographical data. It can:

  • Provide a multi-modal biometric enrollment via a variety of devices from different manufacturers.
  • It can support several different biometric types simultaneously (i.e., fingerprints, facial recognition, iris, vein, speech, signature, etc.) also known as Multi-Factor Authentication (MFA).
  • Distribute the load for biometric matching across a large set of systems allowing for quick additions to system capacity by adding new matchers as needed.
  • All data is stored in a unified database allowing all applications access to data that has been collected from other BII applications.
  • Maintain a comprehensive audit trail of what data has been entered and by whom. It also maintains a change log with the ability to rollback to previous information if needed.
  • Produce detailed custom reports, or distribute previously defined reports to a configurable subscription list.
  • Support applications both online and offline, allowing for deployment in remote locations where communications may pose an issue.

Who uses it?

BII™ is used by public and private entities of varying size who need a robust, customizable system to collect, analyze, and maintain biometric and biographically data in a single centralized information source.

Multiple applications on the same infrastructure: BII™ has the ability to support multiple large-scale applications on the same framework and database. With BII™ different entities can collate and share information on anyone enrolled in the database. With the ability to share between government divisions or commercial departments, BII™ can lower system maintenance costs as well as lower initial roll out costs by using a single, centralized data source.

 

MultiFactor Authentication Support (MFA): With powerful hardware and biometric abstraction, BII™ is able to support multiple methods to enroll and authenticate people. A variety of combinations are possible, with some applications supporting a single biometric type and others using a combination of types. Examples of some of those types include.

  • Something you are: Facial recognition, fingerprints, iris, voice, signature recognition, etc.
  • Something you have: RFID, barcode, smart cards, tokens, and a variety of different card-based credentials
  • Something you know: Password, PIN, etc.
 

Biometric Subtype Authentication: BII™ can also support authentication by subtypes (i.e., ten fingers, two eyes, etc.)

 

Biometric Abstraction: With BII™’s architecture, it can support multiple biometric devices by using a manufacturer's SDK with minimal modification.

 

System Accuracy: With the ability to use multiple biometrics across applications concurrently, the system is able to maintain data accuracy and consistency in a unified database.

 

Scalable: With BII™’s flexible architecture, any solution can be scaled up or down as the need arises. In order to increase capacity and capability all that is needed is to add more server and agent systems. BII can run several large-scale applications or it can scale down to run on a single mobile system.

 

Security: For most civil applications, BII™ will store only templates of biometric traits of enrolled users; these mathematical representations are saved in an encrypted format to safeguard them from unauthorized access. Data traffic between BII™’s server and client agent components are also encrypted ensuring a secure end-to-end solution.

 

Speed: BII™ can ensure a speedy response to requests by increasing the amount of matchers and client agents to distribute the load across a large system. With this method, large biometric searches can be performed in very short periods of time.

 

Comprehensive Dashboard Interface: BII™ is managed through a detailed and easy to use dashboard system that provides the following all in one area:

  • User management
  • Transaction auditing
  • Reporting
  • Language configuration
  • Database management
  • Data field configuration

What is CloudBII™?

CloudBII™ is the cloud deployed version of the BII™ multi-factor authentication biometric framework. Some of the benefits of CloudBII™ include the following on the table.

CloudBII™ Benefits

BII™ CloudBII™
Features & Capabilities The same as CloudBII™ The same as BII™
Time frame for new project implementations Requires purchasing of equipment, shipping it to the destination, Installing & configuring online (including qualified personnel to fly over for few days) in order to have up and running system Very fast – in few hours, we can have CloudBII™ based solution up and running
Maintenance & support for the infrastructure Implementation of local system requires a dedicated room with AC, security, and periodic maintenance of the equipment and local IT personnel to maintain it CloudBII™ and maintenance of 3rd party hardware and software performed automatically by Amazon Web Services (AWS). There is no need to pay extra for it.
Maintenance & support for the application Support for 1st, 2nd and 3rd tiers of supports is required Support for 1st, 2nd and 3rd tiers of supports is required
Installation & Configurations Bio-Metrica personnel are required to fly to the destination and physically install and configure the system. It takes days and costs appropriately determined. Done remotely in matter of hours. Very cost effective process
Education The same as CloudBII™ The same as BII™
Backup of Data Optional – Data can be backed up locally The same as BII™- Optional – Data can be backed up locally
Scalability BII™ is scalable. The customer will need to purchase additional equipment, install and configure locally and in order to scale up the system Scalability (additional HW & SW) can be done remotely in matter of hours
Reliability The system is reliable as the quality of the equipment purchased, and of the local maintenance contracted for; generally it is reliable, however, in remote locations, from experience, the system might be down for long periods because of infrastructure (electricity, AC, damaged cables, stealing and lost equipment), and personnel know-how 99.999% as AWS provides
System Performance (response time) Response time might require additional servers, SW licenses, IT support, etc. it is not dynamic. Dynamic approach – very fast changes between the existing and required response time; in the future it will be done automatically to reach required response time
New projects upfront payment Requires large upfront payments for purchasing set of servers, shipment, custom, delivery, installation & configuration, support of local IT during the initial phase No need for vast upfront payment; the amount is small in comparison to BII™ option
SaaS (Software as a Service) fees Not Applicable Periodic SaaS fees

BII™’s set of applications were designed in such a way that all of them use the same basic functionality (basic modules), with minor changes, and different apps have additional functionalities dedicated for its purpose.

  

Modules allow applications to have functionality added and removed to provide a truly custom system for a deployed application. Some of the available modules and the applications they are usually deployed in are listed in the table below.

  

For further information on Modules, please contact one of our sales team via the Contact Us page.

Module Compatibility

 

Enrollment

Verification/

Identification

Investigation

Request

Management

Card

Management

Reports

EWS™ - Enrollment Workstation

BIS™ - Biometric Identification System

VRS™ - Voter Registration System

CRS™ - Census Registration System

BG™ - Border Guardian (Border Security)

NID™ - National Identification

DLS™ - Driver’s License System

Management Console

Management Console

User Management

Mandatory Fields Selection

Audit Trail

Biometric Data Type

Entity Update

Authentication Types

Identification Config

Supported Platforms:

Supported Devices:

Any other biometric device can be adapted to work with BII™.
Fields marked with an * are required

BII™ Evaluation

If you are interested in finding out more about BII™ we will need some information from you in order to moving things forward.

BII™ Evaluation Process

In order to receive BII™ for a free evaluation, there is a process which needs to be followed. A quick overview of the steps:

  1. Fill out the application form on this page.
  2. Setup the test environment
  3. Installation walk-through

Fill Out the Application Form

Fill out the application form, including the reason for your interest in BII™, and submit it to us. The application will be reviewed and we will return with an approval based on what you have provided. The more accurate the information the quicker the approval process will be.

Setup the Test Environment

Once approved, Bio-Metrica will send a link for download of the software. We recommend to download this software before your installation walk-through appointment. At this time, we also recommend that a suitable lab-testing environment is created for BII™.

During this step, you will need to setup your system according to the prerequisites that are in our documentation so that it is ready for the next step in the evaluation process: The Installation Walk-Trough/Initial Configuration

Installation Walk-Through / Initial Configuration

Bio-Metrica provides all evaluators an installation walk-through/initial configuration which will ensure the framework is installed correctly and also serves to fully configure the framework. During this installation walk through, Bio-Metrica will also provide the trial license key.

What is Included?

The BII™ Evaluation will contain all parts of the BII™ (including the server, agents, and management console). It will function for a time-limited duration of 30 days during which you will be able to test out the functionality of the BII™ framework.

Tags: