Developing an Indigenous Evoting System Architecture – A Case Study By: Dr Agu Collins Agu Director, Zonal Offices Coordinating Department, National Information.

Slides:



Advertisements
Similar presentations
NexSentry Imaging Solutions
Advertisements

RFID Access Control System March, 2003 Softrónica.
2014/6/2 Giga-Tms 1 The latest Biometric Technology.
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
GSM BASED VOTING MACHINE Project Guide: Mr. Gulshan Dubey Lecturer ECE Department Project Team: Himanshu Rewal Vikas Anand Abhishek Bose Sunil Kumar Vikas.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
1 CS2SPE- Group project presentation Haia Al-Majali Bojin Zhou Rania Ali Suraj Patel Fatima Tunc Victoria Casas Sam Diab 19 th March 2008.
BIOMETRIC VOTING SYSTEM
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
© Paradigm Publishing, Inc. 2-1 Chapter 2 Input and Processing Chapter 2 Input and Processing.
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
JAIPUR 16 DEC 08 TECHNOLOGY FOR FINANCIAL INCLUSION Indian Institute of Banking & Finance N D RAO.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Copyright © 2006 Exportech Portugal. All rights reserved.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Data - Information - Knowledge
Gateplus Time Attendance and Access Control System.
Discovering Computers: Chapter 1
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Chapter 9: Moving to Design
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Intercard The Right System March 6, 2012 Alberto Borrero Vice-President, Int´l Marketing & Sales Intercard Mobile: Skype: aborrero
Electronic Poll Book Statutory Overview and VSTOP December 18, 2013 Brad King Co-Director, Indiana Election Division 2014 Election Administrators Conference.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
COMPONENTS OF THE SYSTEM UNIT
ET3100 BioFlex TimeClock. What is fingerprint scanning?  It is a pattern acquisition and recognition established on a person’s.
The Nordic Design House For intelligent products Rune Domsten – Vice President Technology.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
Chapter 9 Elements of Systems Design
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© Paradigm Publishing Inc. 2-1 Chapter 2 Input and Processing.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
ICMAP-Shakeel 1 Infrastructure and Operations. ICMAP-Shakeel 2 Performance Variable for IT Functional capabilities and limitations Price-performance ratio.
Introduction To Computer System
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Module 2: Information Technology Infrastructure Chapter 1: Hardware and Software.
Public Domain/Open Source Software Evaluation Photo Organizer.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
© Paradigm Publishing Inc. 2-1 Chapter 2 Input and Processing.
CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Topics of presentation
9 Systems Analysis and Design in a Changing World, Fourth Edition.
1 Biometric Databases. 2 Overview Problems associated with Biometric databases Some practical solutions Some existing DBMS.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
WELCOME.
G046 Lecture 04 Task C Briefing Notes Mr C Johnston ICT Teacher
CONTACTLESS SMART CARD Betty Yu. What is contactless smart card? A contactless smart card is a contactless MHz credential whose dimensions are credit-card.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
Operating Systems (CS 340 D)
Classroom Attendance System
Biometric technology.
The Italian Academic Community’s Electronic Voting System
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Developing an Indigenous Evoting System Architecture – A Case Study By: Dr Agu Collins Agu Director, Zonal Offices Coordinating Department, National Information Technology Development Agency (NITDA)

BRIEF SYSTEM OVERVIEW NIGCOMSAT’s e-Registration and Voting System is a novel invention of a reliable, secure and always available electronic registration and voting system that adopts two mature technologies for its implementation; RFID (Radio Frequency Identification) and biometrics.

BRIEF SYSTEM OVERVIEW CONT’D The unique combination of both technologies provides an offline system with intrinsic voter authentication as well as instant check for multiple registrations, voting and an anti-rigging mechanism. Complementing this system is a database-driven web application for real-time display of collated data e.g. election results for public viewing.

KEY TECHNICAL SPECIFICATIONS RFID Card Features  Ruggedized PVC card with weather-proof embodiment  Contactless transmission of data (no battery required)  Operating distance 100mm  Fast data transfer (106 kbps)  High data integrity (16 bit CRC, parity, bit coding, bit counting)  True anti-collision  Typical transaction <100ms (including backup management)  Data retention of more than 10 years

KEY TECHNICAL SPECIFICATIONS Security Features  Mutual triple pass authentication (DES, 3-DES and AES)  Data encryption with replay attack protection (DES, 3- DES and AES)  Supports multi application with key hierarchy  Unique serial number for each card  Anti-tear protection mechanism

KEY TECHNICAL SPECIFICATIONS CONT’D RFID Card Reader Features  Operating distance 100mm  Highly integrated analog circuitry to decode card response  Unique serial number  Secure non-volatile key memory  Suitable for high security terminals based on 3-DES, AES, RSA  Anti-collision procedure support  Very low power consumption (USB nano-watt technology)

KEY TECHNICAL SPECIFICATIONS CONT’D Security Features  Mutual triple pass authentication (DES, 3-DES and AES)  Data encryption with replay attack protection (DES, 3- DES and AES)  Supports multi application with key hierarchy  Unique serial number for each reader  Anti-tear protection mechanism  Supports over 32 secret keys

KEY TECHNICAL SPECIFICATIONS Fingerprint Biometrics Features  FBI certified  High performance PC USB fingerprint scanner  256 bit AES  Enrollment time <0.1 second  World’s best performing fingerprint algorithm (NIST MINEX and FVC 2004/2006)  Fast matching speed : 100,000 match within a second  500 dpi optical fingerprint sensor  Very low power consumption (USB nano-watt technology)  Ruggedized scratch free sensor surface

Voter Registration Duplicate Search System Multi-biometric technology to identify duplicate registrations in the nation’s voter database. Accurately identify and remove all duplicate registrations in the voter database. Database that will include photographic and fingerprint records for atleast 80 million voters. With such a large database, the search for duplicates is a complicated task that requires a large number of matching operations and a high degree of reliability. Will become core identification engine for Nigeria’s security / law enforcement system for data portability.

Key Benefits System helps ensure the administration of fair and democratic elections by verifying the accuracy of the country’s national voter database. Up to 40,000,000 fingerprints per second matching speed on a single unit. Scalable cluster architecture. ISO & ANSI fingerprint template standards support. The interoperability and flexibility of the SDK enable the system to work easily with a variety of other software and hardware. The low cost-per-unit and low hardware system requirements enable a cost-effective solution for Nigeria.

How the System Works Face and Fingerprint Capturing The voter information collected consists of face and finger fingerprint images along with personal demographic information of each and every person registered. In essence, the system will capture face and fingerprint data for up to 80 million voters using a variety of input devices, including PC Web cams for capturing face images and fingerprint scanners. The system stores the face and fingerprint images within the RFID Voter’s card and also in a secure database in WSQ format.

Template Generation The Template Generation Module, based on a Matching Client, reads the WSQ images from the database and generates fused face and fingerprint templates that are then stored in a SQL Server Database. The Voter Registration Duplicate Search System then uses these templates to carry out the biometric “N-to-N” matching process that identifies duplicates within the database records.

N-N Matching Our implementation for Nigeria will carry out fusion matching by providing two options: 1. Fuse always 2. Face then fuse The first option, “Fuse always” is for a complete N-to-N matching strategy which requires much more time than that of second option. “Face then fuse” means that the system first generates face score, and if the score crosses the threshold value then the respective finger template is matched. Due to the high speed of the face matching algorithm, this process significantly reduces the amount of time required to identify duplicate entries.

N-N Matching This powerful fused algorithm can produce up to 400,000 matches per second on a single processor PC; and with fault-tolerant, scalable cluster software, this number can be multiplied across multiple PCs to perform extremely fast, parallel fingerprint and face matching using databases of practically unlimited size. The latent fingerprint template editing capabilities will also allow it to be used in forensic AFIS applications.

Server Cluster Architecture The cluster server consists of a server machine, several cluster machines, a cluster server license, several cluster client licenses, and necessary software and data as shown in figure 1 below. It provides significantly high capacity for record matching depending on the number of cluster nodes used. The cluster server can be configured to match up to match tens of millions of records at a time.

Server Cluster Architecture

Detailed System Description The system involves the following four (4) phases: registration, verification, vote casting, and result tallying and display. Below are sub- sections that describe each phase respectively. Registration Phase In the registration phase, designated registration units are used to register eligible voters. In a registration centre, a registration unit is comprised of the following: 1. Notebook 2. HD camera 3. Registration software 4. RFID card reader 5. Fingerprint scanner

Detailed System Description Fingerprint Biometric Scanner A Specimen of an RFID Voter Card RFID Card Reader/Writer RFID Card Printer

Voting Phase The voting phase, designated voting stations are used by eligible voters to vote. A voting station is comprised of the following: Notebook with a touch screen Voting software RFID card reader Fingerprint scanner Ballot printer

Result Tallying & Display Phase A reliable communication link is to be used to connect each voting centre to a centralized command center for vote aggregation of votes from all voting centres. A polling scheme is to be adopted to poll data from each polling centre at a particular interval of time for real-time collation and tallying of results. The collation and tallying process is handled by a database management system (DBMS). The collated and tallied results from the various voting centres are made available for online display through a web application over a secure network and/or Internet.

Web Interface for Result Display including Textual and Graphical Viewing