Factors to Consider When Choosing Accounts Payable Services Providers.pptx
company product
1. Company Axis Software Pvt Ltd, India
Products Biometric ATMs, PIN based ATMs, Kiosks, POS, Cashless ATMs
Date 10/05/10
Product Photographs
(ATMs, Kiosks, POS)
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
2. TABLE OF CONTENTS
1. COMPANY PROFILE
2. AXIS PRODUCT CONFIGURATION DOCUMENT
a) Standard ATMs
b) Optional features available with axis ATMs
c) Cashless ATM
d) Kiosks
e) POS
f) Retro Fit Kit
3. TERMS AND CONDITIONS
4. AXIS SUPPORT POLICY
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
3. 1. COMPANY PROFILE
1. Name of the Company Axis Software Pvt. Ltd.
Registered under the Companies Act in 1993
2. Brand Name AXIS
3. Nature of Business Design, Develop, Manufacture & Marketing of Biometric ATMs,
PIN Based ATMs, Cashless ATMs, Kiosk & POS
4. Product Lines
a)Transaction Terminals • Biometric ATM
• PIN Based ATM
• Cashless ATM
• Kiosk
• Point of Sale (POS)
• Retro Fit Kit
• Time and Attendance System
• Access Control System
b) Fixed and Wireless • Fixed Line ATM Terminals
Products • Wireless ATM Terminals
• Mobile ATM Terminals
• Bill Payment Kiosk
• Passbook Printing Kiosk
• Fund Transfer Kiosk
• Check Depositing Kiosk
• Ticketing Kiosk
• Information Kiosk
• Fixed Line POS terminals
• Wireless POS terminals
• Biometric POS
• Biometric Authentication Software
c) Software Products
• Time and Track Software
• Kiosk Monitoring Software
• Remote Monitoring Software
• WOSA XFS/ J XFS
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
4. 5. Technology Expertise • Hardware & software customization for ATMs, Kiosks,
Cashless ATMs, POS, Time and Attendance system,
EMV, application development experience on various
Card based technologies
• Research, design & development Encryption
(Symmetric & Asymmetric) Biometrics
• Wide experience in product development &
prototyping
We export our products to various countries in APAC, EMEA &
6. Exports USA
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
5. COMPANY PROFILE in detail:
Headquartered in Pune (India) and founded in April 2000, Axis is a technology-driven
Company, developing innovative products and solutions that increase user confidence in the
electronic infrastructure, increase service efficiency and build new delivery channels through
the application of intelligent technologies -both software and hardware- using biometrics,
encryption and related technologies.
Axis’ areas of focus are PIN based and Biometric based ATMs, Kiosks for various transaction
applications (Funds Transfer, Check-cashing, Ticketing, loan Application etc.), Attendance and
Access Control Systems (both logical and physical), Large database systems for National ID,
Voter Identification and Criminal Justice (Police) systems, having its expertise in card based
technologies.
Axis has designed a full-featured ATM, called -Automated Banking Machine or ABM for an
American financial institution. The ABM has other banking features like funds-transfer, check
truncation (cashing), loan application, loan disbursal and currency and coin acceptance and
disbursal. Axis has also developed an innovative product called the Biometric Retrofit Kit for
ATMs/kiosks. This kit converts a regular ATM to a Biometric base, either fingerprint or iris,
ATM. This very easy to deploy kit is very affordably priced.
Axis is generally considered the first in the world to have developed a biometric, EFT switch
based authentication, full-featured ATM. Axis has successfully tested these ATMs/kiosks and is
currently deploying them, inter alias, through Citibank. If you are deploying ATMs/kiosks for
the first time then you should seriously consider our Biometric based ATMs/kiosks that require
no expensive back-end infrastructure, like EFT switch and HSM, and can be deployed almost
overnight at a fraction of the cost of regular PIN based ATMs/kiosks. You do not need to invest
in cards, expensive PIN management software and helpdesks for lost cards and forgotten
PINs. A user can be registered in minutes and start using the ATM immediately.
How do we make this possible?
• Complete in-house research, design, development & manufacturing
• Very short overall product development cycle
• Wide experience in product development including prototyping & injection molding
• Required skills for developing advanced financial systems
• Linux / Microsoft / Embedded Platforms
Axis is ISO: 9001:2000 certified. Axis has several patents applied for in the USPTO and
employs close to 100 employees with a strong focus on R&D and innovation.
Advantages of Axis ATMs:
• High transaction security
• Very low total cost of ownership
• Low operating cost
• Easy to use
• Quick and easy to deploy
• High customer convenience
• Alternative authentications – biometrics, in addition to PINATMs can operate in Switch
or Switch-less mode with minimal changes to existing infrastructure
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
6. 2. Axis Product Configuration Document
A) Axis Standard ATMs:
1. AX 811 with Standard features
Type: Stand Alone
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read / CD
Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 10” Colour TFT LCD
Security Lock Type: Single Mechanical Combination Lock
Cash Cassette Configuration: 1 Cassette
Each Cassette Capacity: 1000 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
7. 2. AX 811 E with Standard features
Type: Stand Alone
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read / CD
Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 10” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Single Mechanical Combination Lock
Cash Cassette Configuration: 1 Cassette
Each Cassette Capacity: 1000 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
8. 3. AX 821 with Standard features
Type: Stand Alone
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read /
CD Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 10” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination with Time Delay + Mechanical Lock
Cash Cassette Configuration: 2 Cassettes
Each Cassette Capacity: 1700 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Camera: Optional
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
9. 4. AX 825 with Standard features
Type: Through The Wall
Access: Rear Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read /
CD Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 15” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination with Time Delay + Mechanical Lock
Cash Cassette Configuration: 2 Cassettes
Each Cassette Capacity: 2500 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Camera: Optional
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
10. 5. AX 835 with Standard features
Type: Through The Wall
Access: Rear Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read /
CD Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 15” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination with Time Delay + Mechanical Lock
Cash Cassette Configuration: 3 Cassettes
Each Cassette Capacity: 2500 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Camera: Optional
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
11. 6. AX 831 with Standard features
Type: Lobby Type
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read / CD
Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 15” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination with Time Delay + Mechanical Lock
Cash Cassette Configuration: 3 Cassettes
Each Cassette Capacity: 2500 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Camera: Optional
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
12. 7. AX 831 E with Standard features
Type: Stand Alone
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD Read /
CD Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 10” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination with Time Delay + Mechanical Lock
Cash Cassette Configuration: 3 Cassettes
Each Cassette Capacity: 2500 Notes
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Envelop Depositor: Available
Camera: Optional
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
13. 8. AX 841 (ABM) with Standard features
Type: Stand Alone
Access: Front Loading
Emulation: NDC Compliant
Authentication 1: PIN
Authentication 2: Biometric
Processor & Memory: Intel CHIP Set
Media Reader / Writer: Combination DVD
Read / CD Write
Speakers: Dual 4W
Card Reader: Magnetic / DIP
PIN Pad and Menu Keys: EPP + 8 FDKs
Display: 10” Colour TFT LCD
Safe: 6mm or UL 291 Level 1 Compliant
Security Lock Type: Digital Combination
with Time Delay + Mechanical Lock
Cash Cassette Configuration: 3 Cassettes (Multiple up to 4)
Each Cassette Capacity: 2500 Notes
Cash Deposit: Available
Coin Deposit: Available
Coin Dispense: Available
Check Scanner: Check 21 Compliant
Consumer Printer: 35 Column Thermal
Electronic Journal: Available
Envelop Depositor: Available
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
20. F) RETROFIT KIT
Retro Fit Kit ATM (AX-801)
Axis Biometric Retrofit Kits for ATMs:
Axis has developed an innovative new product called the Biometric Retrofit Kit for ATMs. This
kit converts a regular ATM to a biometric based, either fingerprint or iris, ATM. This very easy
to deploy kit is very affordably priced. This kit has generated a huge interest among financial
institutions. This device can convert your standard ATMs to Biometric ATMs. Retro Fit Kit can
be integrated with existing standard ATMs to make them more secure with fingerprint
authentication technology. The functionality of the ATM remains the same with an added
advantage of Biometrics. Various combinations of PIN number, cards, & biometrics can be
used for authentication depending upon the security levels.
Robust and fault tolerant. Can operate in non air-conditioned Environment Quick and easy to
deploy. Can start using within hours of Installation User-friendly Displays, Optional Touch
Screen Dynamic interfaces - Intelligent audio, visual & silent alerts Compatible with popular
ATM switches. Advanced image processing and pattern recognition algorithms for Fingerprint
verification
Technical Details:
Protocol Support: Supports NDC Protocol
Device Supports: Audio: Online audio instructions
Fingerprint Scanner: Optical
Display: Two Lines LCD
Operating Humidity: 90 % RH
Operating System: Linux
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
21. 3. TERMS & CONDITIONS
1. PAYMENT TERMS
100% as advance along with the purchase order
2. DELIVERY PERIOD
Delivery is subject to Force Majeure conditions, for which Axis shall not be responsible Delivery
of the ordered equipment, shall be within 4-6 weeks subject to Axis receiving a confirmed order
with advance payment specifying the configuration and site location
3. DUTIES & TAXES
The above rates of hardware and software are exclusive of any other applicable local taxes. All
such taxes are extra and will be payable at actual by the buyer
4. INSTALLATION & TRAINING
Installation:
Axis engineers will install the ATM Hardware and Software at the buyer’s site @US$250.00 per
ATM. The buyer will have to bear the to-and-fro economy class air travel charges, food & local
stay for two Axis installation engineers. Due to some conditions/reasons, if the buyer is not able
to get the installation done or is unable to provide the required resources (in terms of ATM
installation) to Axis engineers within 15 day’s, then it will be assumed that the delay in ATM
installation is caused by the buyer & that the buyer will have to pay an extra charge US$100.00
per day per engineer.
Training at Axis Software premises Pune, India:
A 4-day Axis Certified ATM Training is available at our Technical Training Workshop at Pune
@ US$ 500.00 per buyer personal for a maximum of three buyer personnel, which includes:
ATM Administration and Transaction Analysis
First Level Maintenance and ATM Replenishment Training
ATM Troubleshooting Procedures
ATM Startup and Shutdown
ATM Diagnostics
Customer’s Fingerprint Registration Procedure
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
22. ATM software Flow & System study
Travel Conveyance and Accommodation at Pune is to be borne by the buyer. Please inquire
with Axis for the training schedules.
Training at buyer’s site or other convenient location:
If in case this training is required at the buyer’s site or some other convenient location by the
buyer, US$ 1,500.00 will be charged per day. The buyer will have to bear the to-and-fro
economy class air travel charges of the installation engineer. We will also provide an on-site
ATM procedures training for two bank personnel at the ATM site once the ATM is installed.
Note: All the above are payable in advance.
5. WARRANTY
The equipment supplied by Axis shall be warranted against defects for a period as follows:
12 months from date of delivery / dispatch. Our warranty shall not apply to goods which have
been altered or repaired or damaged after installation by anyone except our authorized
Employees, nor shall it apply if the goods have been damaged by power fluctuations, abuse,
negligence, customer modification, misapplication, lightning, water damage or any other natural
calamities. Our obligation and liabilities hereunder shall not be enforceable until our goods
have been fully paid for. Our warranty is limited to the original purchaser only.
6. AMC (annual maintenance contract) CHARGES
After Warranty, AMC @ 13% and 15% of the total order value will be charged for the first and
second year respectively, payable at the beginning of the contract period.
7. OTHER CONDITIONS
Certification: Any product certification required for shipment, will be bare by the buyer
Exclusion of work: Any sort of civil and electrical work, conducted for the buyer would perform
main power supply to the system
Quotation validity: Thirty (30) days from the date of this quotation Purchase Order should
favor Axis Software Pvt. Ltd., Pune
8. JURISDICTION - Any future disputes that may arise out of this proposal are subject to the
jurisdiction of courts at Pune, India only.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
23. 4. AXIS Support Policy
Axis uses world-class and new components for all its products. As a result, AXIS’ products are
working even in rural India, where the temperatures soar up to 480 C and it is very dusty, for 4
to 5 years without any major preventive or remedial maintenance requirement. Axis
recommends that moving parts require minimum support and hence the remedial and
preventive maintenance will be significantly low if components with moving parts are avoided.
For instance: a Dip Card Reader is much more efficient and needs less maintenance than a
Motorized Card Reader. The major maintenance issues with the Cash Dispenser are
associated with the removal of currency bills that are jammed. Axis products are designed in
such a way that all components are easy to reach and service. Bank personnel trained by Axis
can easily accomplish a bill jam removal.
AXIS believes in training the deployer for the maintenance of its products so that the deployer
gets maximum uptime from them. Case in point is if there is a paper jam and a support person
is to be deployed by AXIS, and then it might take the support engineer to reach the site in a
day, or more in some cases, which would result in expensive down time. Alternatively, if
deplorer’s personnel are trained, the situation can be remedied in a matter of a few minutes,
resulting in dramatically increasing the uptime of the service the buyer wishes to provide.
All of the above significantly reduce the Total Cost of Ownership of Axis products resulting in
quicker payback for the investment made and also the increase in the confidence levels of the
users of the services because of very high uptimes.
The deployer also saves a lot of money on the subsequent Annual Maintenance Costs, as they
get mitigated due to larger role being played by the deployer. There is also a greater sense of
ownership amongst the deployer’s personnel resulting in overall better service experiences for
the user.
AXIS provides training to deployer’s personnel free of cost if the deployer purchases a total of
at least 50 ATM units.
AXIS’ Online and Telephonic support is available round the clock for guidance if so required
post training.
Axis maintains spares for at least duration of 5 (five) years after the delivery of the products.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
24. KEY AXIS PRODUCTS & BIOMETRICS
Time N’ Track
It is a family of powerful microprocessor based Time & Attendance and Access Control
system enabled with the latest Biometrics, encryption and smart card technology. The
System supports a very friendly user interface and advanced policy software. The SBC
supports various biometric technologies and sensors.
DesCop
It’s a Biometrics based desktop protection system from Axis, which secures your computer
from unauthorized use. You can control access to your sensitive files and prevent them from
falling into the wrong hands. DesCop offers comprehensive data security protection with:
• Logon/Screensaver System
• Logging on to the network
• File encryption system
• File/Folder/Drive/Application locking system
• Encryption of the file while sending it over the network
• Effective user management
Access can be controlled through any one or a combination of Password, Biometrics or Smart
Card and can also be added to the toolbar of applications such as Internet Explorer, Microsoft
office, Outlook, etc.
BioEnable
BioEnable is a software integration kit, which allows an easy integration of the “Axis Biometrics
Authentication Suite” with your Enterprise or E-Business applications. Your employees,
customers or clients can easily log into your computer networks, whether web-based or other,
to access accounts, confidential files, applications, and privileged content. And have their
identity biometrically authenticated to gain access to service without the hassle of remembering
passwords or pins and without compromising the security of your business.
BioEnterprise
Corporates can provide secure access to their enterprise applications such as ERP software,
Banking & Finance applications and Internet servers, quickly without any integration.
BioEnterprise provides a new layer of security over passwords. It verifies the user's identity and
allows quick access to one, some or all applications at once. NO matter where your
employees log on from, they can quickly and easily access authorized files and company
information.
BioExchange
BioExchange allows you to exchange documents securely in an organization. You can secure
any document with a right click of your mouse. Once secured, it can be opened; only by you
and the peoples to whom you have authorized to open it. BioExchange provides unique
integration of
Bio PKI
BioPKI provides efficient and tested framework for secure transactions and exchange of data
across networks. BioPKI patches certain drawbacks, which PKI has such as, mobility problem,
storage of private key, and physical access to machine storing your private key. With BioPKI,
your private key is generated only when you give your biometric and you can transact safely
from any machine anywhere in the world.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
25. ASAT (Axis Semi Automated Teller)
ASAT is a biometric based semi automated transaction system for Banks, Financial Institutes,
Government Organizations and Corporates. ASAT allows banks to automate branch operations
without investing in huge electronic network infrastructure like ATMs. ASAT consists of a
biometric authentication terminal installed outside the teller counter. Customers enter account
number and verify biometric to withdraw money instead of going through the manual process of
filling withdrawal slips, signature verification and repetitive cash counting by the teller.
ACC (Automated Cheque Clearance)
Axis provides an innovative patent pending product that offers a secured, efficient platform for
Corporate Banking. The current cheque clearance authentication process is manual, time
consuming and prone to human errors. It is also very tedious as it involves checking
authentication directives (Business Logic) and matching signatures on the cheque with that in
the database in order to grant clearance. Axis Automated Cheque Clearance (ACC) adds
another layer to signature authentication with an annotation, which is coupled with biometric
authentication.
In ACC, an annotation is printed on the cheque, which stores confidential information such as
signatory details, cheque information and fingerprints of the signatories. When a cheque comes
in for clearance the Axis System with the banker just scans the annotation and matches the
data with that in the database and authentication is done. At the same time other authorizations
are also ascertained like whether signatories are authorized to sign, whether the amount they
are authorized to sign is not exceeded etc.
All biometric systems operate in a similar fashion. First, the system captures a sample of the
biometric characteristic (ie.enrollment process). During enrollment, some biometric systems
may require a number of samples in order to build a profile of the biometric characteristic.
Unique features are then extracted and converted by the system into a mathematical code.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
26. This sample is then stored as the biometric template for the enrollee. The template can reside
on a computer database, smart card or barcode.
In addition, the biometric system may require a trigger, or a means of matching the template to
the person, for e.g. a PIN is keyed-in to access the template, or a smart card storing the tem-
plate is inserted into a card reader. In either case, the end user interacts with the biometric sys-
tem for a second time to have his or her identity checked. A new biometric sample is then
taken and this is compared with the template. If the template and the new sample match, the
end user is granted access. This is the basic premise of biometrics - that a person has a
sample of their biometric data captured and the biometric system decides if it matches with an-
other sample.
The following four-stage process illustrates the way our biometric systems operate:
Capture - a physical or behavioral sample is captured by the system during
enrollment
Extraction -unique data is extracted from the sample and a template is created
Comparison -the template is then compared with a new sample
Matching - the system then decides if the features extracted from the new sample are
matching or not.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
27. Fingerprint Verification
Basics
Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in,
easily accessible identity cards. You have a unique design, which represents you alone,
literally at your fingertips. How did this happen? People have tiny ridges of skin on their fingers
because this particular adaptation was extremely advantageous to the ancestors of the human
species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip
things, in the same way a rubber tread pattern helps a tire grip the road. The other function of
fingerprints is a total coincidence. Like everything in the human body, these ridges form
through a combination of genetic and environmental factors. The genetic code in DNA gives
general orders on the way skin should form in a developing fetus, but the specific way it forms
is a result of random events.
The exact position of the fetus in the womb at a particular moment and the exact composition
and density of surrounding amniotic fluid decides how every individual ridge will form. So, in
addition to the countless things that go into deciding your genetic make-up in the first place,
there are innumerable environmental factors influencing the formation of the fingers. Just like
the weather conditions that form clouds or the coastline of a beach, the entire development
process is so chaotic that, in the entire course of human history, there is virtually no chance of
the same exact pattern forming twice.
Consequently, fingerprints are a unique marker for a person, even an identical twin. And while
two prints may look basically the same at a glance, a trained investigator or an advanced piece
of software can pick out clear, defined differences. This is the basic idea of fingerprint analysis,
in both crime investigation and security. A fingerprint scanner's job is to take the place of a
human analyst by collecting a print sample and comparing it to other samples on record. In the
next few sections, we'll find out how scanners do this.
Verification
There are a variety of approaches to fingerprint verification. Some of them try to emulate the
traditional police method of matching minutiae, others are straight pattern matching devices,
and some adopt a unique approach all of their own, including moiré fringe patterns and
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
28. ultrasonic. Some of them can detect when a live finger is presented, some cannot. There are a
greater variety of fingerprint devices available than any other biometric at present.
Potentially capable of good accuracy (low instances of false acceptance) fingerprint devices
can also suffer from usage errors among insufficiently disciplined users (higher instances of
false rejection) such as might be the case with large user bases. One must also consider the
transducer / user interface and how this would be affected by large scale usage in a variety of
environments. Fingerprint verification may be a good choice for in house systems where
adequate explanation and training can be provided to users and where the system is operated
within a controlled environment.
It is not surprising that the workstation access application area seems to be based almost
exclusively around fingerprints, due to the relatively low cost, small size (easily integrated into
keyboards) and ease of integration.
Matching
Among all the biometric techniques, fingerprint-based identification is the oldest method, which
has been successfully used in numerous applications. Everyone is known to have unique,
immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of
the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and
furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur
at either a ridge bifurcation or a ridge ending. Fingerprint matching techniques can be placed
into two categories: minutiae-based and correlation based. Minutiae-based techniques first find
minutiae points and then map their relative placement on the finger. However, there are some
difficulties when using this approach. It is difficult to extract the minutiae points accurately when
the fingerprint is of low quality.
Also this method does not take into account the global pattern of ridges and furrows. The
correlation-based method is able to overcome some of the difficulties of the minutiae-based
approach. However, it has some of its own shortcomings. 8Correlation-based techniques
require the precise location of a registration point and are affected by image translation and
rotation.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
29. Fingerprint matching based on minutiae has problems in matching different sized
(unregistered) minutiae patterns. Local ridge structures cannot be completely characterized by
minutiae. We are trying an alternate representation of fingerprints, which will capture more local
information and yield a fixed length code for the fingerprint. The matching will then hopefully
become a relatively simple task of calculating the Euclidean distance will between the two
codes. A commercial fingerprint-based authentication system requires a very low False Reject
Rate (FAR) for a given False Accept Rate (FAR). This is very difficult to achieve with any one
technique. We are investigating methods to pool evidence from various matching techniques to
increase the overall accuracy of the system. In a real application, the sensor, the acquisition
system and the variation in performance of the system over time is very critical. We are also
field testing our system on a limited number of users to evaluate the system performance over
a period of time.
Classification
Large volumes of fingerprints are collected and stored everyday in a wide range of applications
including forensics, access control, and driver license registration. An automatic recognition of
people based on fingerprints requires that the input fingerprint be matched with a large number
of fingerprints in a database (FBI database contains approximately 70 million fingerprints!). To
reduce the search time and computational complexity, it is desirable to classify these
fingerprints in an accurate and consistent manner so that the input fingerprint is required to be
matched only with a subset of the fingerprints in the database
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
30. Fingerprint classification is a technique to assign a fingerprint into one of the several pre-
specified types already established in the literature, which can provide an indexing mechanism.
Fingerprint classification can be viewed as a coarse level matching of the fingerprints. An input
fingerprint is first matched at a coarse level to one of the pre-specified types and then, at a finer
level, it is compared to the subset of the database containing that type of fingerprints only. We
have developed an algorithm to classify fingerprints into five classes, namely, whorl, right loop,
left loop, arch, and tented arch. The algorithm separates the number of ridges present in four
directions (0 degree, 45 degree, 90 degree, and 135 degree) by filtering the central part of a
fingerprint with a bank of Gabor filters. This information is quantized to generate a Finger Code,
which is used for classification.
Our classification is based on a two-stage classifier, which uses a K-nearest neighbor classifier
in the first stage and a set of neural networks in the second stage. The classifier is tested on
4,000 images in the NIST-4 database.
For the five-class problem, classification accuracy of 90% is achieved. For the four-class
problem (arch and tented arch combined into one class), we are able to achieve a classification
accuracy of 94.8%. By incorporating a reject option, the classification accuracy can be
increased to 96% for the five-class classification and to 97.8% for the four-class classification
when 30.8% of the images are rejected.
Image Enhancement
A critical step in automatic fingerprint matching is to automatically and reliably extract minutiae
from the input fingerprint images. However, the performance of a minutiae extraction algorithm
relies heavily on the quality of the input fingerprint images. In order to ensure that the
performance of an automatic fingerprint identification/verification system will be robust with
respect to the quality of the fingerprint images, it is essential to incorporate a fingerprint
enhancement algorithm in the minutiae extraction module. We have developed a fast
fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and furrow
structures of input fingerprint images based on the estimated local ridge orientation and
frequency. We have evaluated the performance of the image enhancement algorithm using the
goodness index of the extracted minutiae and the accuracy of an online fingerprint verification
system. Experimental results show that incorporating the enhancement algorithms improves
both the goodness index and the verification accuracy.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com
31. Scanners: (Optical Scanner)
A fingerprint scanner system has two basic jobs - it needs to get an image of your Finger, and it
needs to determine whether the pattern of ridges and valleys in this image matches the pattern
of ridges and valleys in pre-scanned images. There are a number of different ways to get an
image of somebody's finger. The most common methods today are optical scanning and
capacitance scanning. Both types come up with the same sort of image, but they go about it in
completely different ways.
The heart of an optical scanner is a charge-coupled device (CCD), the same light sensor
system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive
diodes called photo sites, which generate an electrical signal in response to light photons. Each
photo site records a pixel, a tiny dot representing the light that hit that spot. Collectively, the
light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an
analog-to-digital converter in the scanner system processes the analog electrical signal to
generate a digital representation of this image. See How Digital Cameras Work for details on
CCDs and digital conversion.
The scanning process starts when you place your finger on a glass plate, and a CCD camera
takes a picture. The scanner has its own light source, typically an array of light-emitting diodes,
to illuminate the ridges of the finger. The CCD system actually generates an inverted image of
the finger, with darker areas representing more reflected light (the ridges of the finger) and
lighter areas representing less reflected light (the valleys between the ridges). Before
comparing the print to stored data, the scanner processor makes sure the CCD has captured a
clear image. It checks the average pixel darkness, or the overall values in a small sample, and
rejects the scan if the overall image is too dark or too light.
If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and
then tries the scan again. If the darkness level is adequate, the scanner system goes on to
check the image definition (how sharp the fingerprint scan is). The processor looks at several
Straight lines moving horizontally and vertically across the image. If the fingerprint image has
good definition, a line running perpendicular to the ridges will be made up of alternating
sections of very dark pixels and very light pixels. If the processor finds that the image is crisp
and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on
file.
Disclaimer: Axis® is a registered trademark owned by Axis Soft.pvt.ltd. Other brands and names mentioned herein
may be the trademarks of their respective owners. Neither the whole nor any part of the information contained in, or
the product described in, this document may be adapted or reproduced in any form without the prior written
permission of the copyright holder. The product described in this document is subject to continuous developments
and improvements. Axis Soft.pvt.ltd gives all particulars of the product and its use contained in this document in
good faith. However, all warranties implied or expressed, including but not limited to implied warranties of
merchantability, or fitness for purpose, are excluded. This document is intended only to assist the reader in the use
of the product. Axis Soft.pvt.ltd shall not be liable for any loss or damage arising from the use of any information in
this document, or any error or omission in such information, or the use or inability to use the product.
Axis Software Private Limited
1215/2/13, K.P. Kulkarni Marg, Off Apte Road, Shivaji Nagar, Pune 41100
www.axistech.com