KSA’s National Information Center (NIC) and Public Security have launched a mobile biometrics system to verify hajj permits; Mohammed Al-Sulami of Arab News reported on Monday, August 28.
The system provides the security personnel with many electronic services, including checking hajj permits and security scanning for wanted persons. This is conducted within seconds through fingerprinting, national ID or residence identity numbers.
This technology will enhance and support the technical capacities of security personnel through the provision of easy-to-carry smart devices. These devices can provide information through fingerprints, ID scanning, and cameras.
The system has many features such as the taking of non-registered biometrics and sending them to the fingerprint processing system at the NIC, and identification of persons through the national ID or residence identity numbers.
The system provides register reports carried out by the operator of the system, on the validity of hajj permit, violations, and their registration in the database of the NIC through an individual’s fingerprints.
The launching of the system comes in completion of technical and security work carried out by the NIC and Public Security in using technology in the field of security.
What is Biometrics?
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication is used in computer science as a form of identification and access control.
Biometric identifiers are then distinctive, measurable characteristics used to label and describe individuals. These identifiers are often categorized as physiological versus behavioral characteristics.
Examples include fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odour/scent and other methods. While the patterns of a person’s behavior include typing rhythm, gait, voice in addition to other techniques.
Some researchers have coined the term behaviometrics to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver’s license or passport, and knowledge-based identification systems, such as a password or personal identification number.
Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.