ABIS: what is it, and how does it work

Private companies and public services have a common goal: ensuring the security and accuracy of large amounts of data. To achieve the security needed in a large-scale context, the Federal Police, for example, implemented ABIS technology to bring together data from across the country into a national biometric database.

Most sectors are moving toward the digital world, which causes an increase in data production and the fragility of this information as well. The security mechanism present in ABIS for identifying people is biometrics, used by police authorities and by other sectors of the economy.

This technology already has a high rate of adherence and effectiveness. According to Experian's Global Fraud and Identity Report 2022, 93% of Brazilians consider the technology as the most secure for a digital experience.

To understand more about how the ABIS system works and is used, continue with me!

What is ABIS?

ABIS stands for Automated Biometric Identification System. The system's main objective is to identify individuals. To do this, it uses biometric characteristics, unique to each individual, in large biometric databases in a fast, accurate and scalable way.

In general, ABIS is used by law enforcement agencies to automate the verification and identification of individuals and to correlate people to events by collecting fingerprints from crime scenes. It is also used to identify duplicates in bank records and large e-commerce sites to prevent fraud and scams.

Now that we know what ABIS stands for, let's see how it works.

How does ABIS work?

Generally ABIS can be used to verify several types of biometric characteristics, primarily facial and fingerprint recognition.

In this explanation we will focus only on fingerprints. 

The ABIS verification process starts by collecting the biometrics that will be used in the process. This collection can be done at biometric collection points for official documents or directly from crime scenes through forensics. It is also possible to capture fingerprints through the camera of cell phones.

Foto: Detran-DF/Divulgação

The result of the collection is a biometric template. More about it below.

What are biometric templates?

Biometric templates are captures of an individual's physical characteristics converted into a format that can be easily compared and archived in computers. The most common types of biometric templates are:

  • Fingerprints.
  • Face shape.
  • Irises.
Fingerprints. Source: Pexels.

In the case of fingerprints, the palms of the hands, feet, and fingertips have a series of lines that can end or bifurcate into well-known patterns. 

These patterns are known as minutiae. It is by comparing the minutiae that similarities between two or more models are checked. See below:

Examples of minutiae. a) Bifurcation b) Termination c) Lakes d) CrossoverSource: Thiago da Silva Castro's thesis

The identification and extraction of these patterns along with the subsequent recording in a digital format that is easy to compare, archive, and manipulate are essential to the operation of a good biometric system. 

This process is commonly called Enrollment. Learn about the steps:

The steps of an ABIS. Source: elaborated by the author.

The first part is the acquisition of a biometric sample. After this, ABIS must extract the minutiae, also called attributes. 

Right after that the template can be saved in the database and processed for identification or verification. More about this will be said shortly.

There are several formats available for storing biometric templates in a database. The best known is WSQ (Wavelet Scalar Quantization) created by the FBI and NIST. 

There is one point of greater importance that deserves more attention: the format of the biometric template should combine as much information as possible without affecting the ability to compare two different templates and storage issues.

Verifying Biometric Templates

After extracting and storing the biometric template, it is time to process it. This is when ABIS shows its value. 

There are basically two ways of processing in ABIS: verification and identification. 

In verification, ABIS compares two biometric templates using an algorithm that specializes in finding the degree of similarities between these templates. In a criminal ABIS, at the end of the process, a parole officer can attest to the veracity of the process, which greatly speeds up his or her work.

This process is known as 1-to-1, ehich means this process takes place from one processed model compared to another unique model. Verification must be an extremely fast process, almost instantaneous, and we will see why in a moment.

Now learn how to practice verification and identification of biometric templates.

Identifying biometric templates

The identification process, also known as 1-to-N or 1-to-many, is the similarity checking of a biometric template against a large number of other templates. 

The number of templates varies depending on how you use ABIS. You can handle thousands or even hundreds of millions of templates.

To make this possible, ABIS needs the biometric template verification process to be extremely optimized and accurate. Therefore, ABIS uses certified proprietary algorithms that meet the requirements of regulatory and standardization bodies. The best known certifications of biometric verification algorithms are MINEX III, FRVT, and iBeta Spoofing and Liveness. 

Once the identification is complete, ABIS will create a list of templates that have achieved a minimum similarity score. With this list in hand, an operator can certify the outcome of the process, automate decision making, or generate reports.

What does the ABIS infrastructure look like?

Running a large-scale ABIS is not a simple task. 

It is about operating a system that can deliver sufficient performance to execute thousands of transactions per second. For this, a demand-responsive infrastructure is required. A number of clustering, load distribution, and high-performance computing techniques are required to run an ABIS. 

In addition, you need servers with large amounts of RAM and CPU to optimize the process. Every millisecond counts when it comes to processing thousands of biometric templates in the shortest possible time. 

For legal and security reasons, the entire environment must be tested and always have the latest updates available, since extremely important data is at stake.

ABIS as a service

As mentioned earlier, the infrastructure required to run an ABIS is complex to manage. However, you can avoid this kind of problem by using ABIS delivered as a service.

In this mode, the ABIS infrastructure is managed by a specialized company that offers ABIS as a service that can be purchased and then paid for on a usage basis. Using ABIS in the cloud can accelerate its use for many different types of services.

Still, an application does not always need all the processing power of a large-scale ABIS. 

There are cases where just a few isolated functions, such as biometric template verification, proof of life, or image enhancement and quality control, can revolutionize a conventional web application.

More security and accuracy with ABIS technology

ABIS is a rapidly growing technology, given the urgent demand for systems with biometric capabilities. 

Whether it is to provide more security for your customers or to meet the needs of public agencies, the usability of the system can help both civil society and the state due to technology and innovation.

Managing an ABIS locally can be a challenging task. However, with the help of options such as ABIS as a service or biometrics APIs and SDKs solutions, any current web application can enter the world of biometrics and develop in the biometric application market.

Translation: Thalita Ferreira

Don't miss out on our updates!

Subscribe to BioPass ID's newsletter and stay up-to-date with the world of biometrics and technology.

Thanks! We received your message!
Oops! Algo deu errado no envio do formulário.
Tente novamente em instantes.

Latest

Multibiometrics: A step-by-step guide to implementing multifactor authentication into applications

Multifactor authentication increases security in digital environments. Discover BioPass ID's multibiometrics for data protection.

Tutorials
Artificial Intelligence in Schools: Benefits for Educational Management

The use of artificial intelligence in schools improves the administrative processes and optimizes the financial management of schools. Learn more about the use of technology in teaching.

Features
Financial fraud: how multi-factor authentication can help solve the problem

Multi-factor authentication is the trend emerging to combat the rise in financial fraud. Find out how to use and apply the technology.

Business
Health 4.0: what it is, its benefits and challenges

Health 4.0 is data-driven and focused on personalizing patient care. This article explores the benefits and challenges of this approach.

Business
Contactless technology: learn about the innovation and its benefits

Contactless technology is growing at more than 180% annually, with strong adoption among the Brazilian public. Learn more about contactless payments.

Trend
Types of healthcare fraud: how biometrics can prevent them

Discover the most common healthcare frauds and how biometrics can help prevent these threats.

Privacy and Security
3 technology trends for the healthcare market

Technology helps improve both human and institutional health. Find out more about the emerging trends in the healthcare market.

Business
How to prevent fraud in public tenders with biometrics?

Fraud in public tenders can be prevented using biometrics, which brings more security and reliability to competitions. Find out more!

Business
How can BioPass ID APIs optimize healthcare services?

The use of APIs in healthcare simplifies processes and improves the quality of medical care. Learn more!

Business
How biometrics strengthens security in brazilian schools

The biggest benefit of using biometrics in schools is increased security. But there are many other benefits. Find out more here.

Business
Discover how BioPass ID prevents financial fraud

Fraudsters create new financial scams every day. Discover how BioPass ID protects companies and customer data from malicious actions.

Features
Telemedicine in Brazil: 5 advantages of using biometrics

The security and confidentiality of telemedicine in Brazil are concerns that are eliminated with the use of biometrics. Read more in the article.

Business
APIs for the financial market: how can they help your company?

APIs bring agility and savings to banks and fintechs. Discover other benefits that can also help financial institutions.

Features
3 APIs for the BioPass ID to streamline the education process

Biometric APIs can increase the security of educational institutions and improve operational efficiency and the student experience. Find out more.

Features
How to identify and prevent bank fraud

Learn how to identify bank fraud and how biometrics can help secure your information.

Business
Technology in Finance: trends and challenges

Artificial intelligence, open finance, and advanced biometrics promise to transform the financial marketplace. Learn more to stay ahead.

Business
5 security trends in education

Schools are facing complex security challenges and are trusting in technological innovation to solve these problems. Discover the top 5 trends.

Business
GDPL and biometrics: what to do to adapt

The GDPL has raised questions about the treatment and privacy of user data. Understand once and for all how it works.

Privacy and Security
5 benefits of using a Rest API

Rest APIs are ideal for cloud applications. Find out how to use them in your project.

Features
Cybersecurity: what it is and how to invest

Learn all about cybersecurity and find out how to protect your data online.

Privacy and Security
Liveness Detection: what’s the difference between passive and active?

The liveness detection technology may be used in a passive and active method to identify the proof of life authenticity of an image. Learn what’s the difference between them.

Features
ICAO standard: how to ensure biometric image quality

Quality biometric images meet ICAO standard to optimize identification and identity verification. Check out BioPass ID's solutions.

Features
Microservices architecture: what they are and their benefits

Learn what is the architecture model for software development using microservices and what are its advantages.

Business
How to speed up software developments with SDKs

The Face SDK, one of the BioPass ID SDKs, makes it possible to build and configure development platforms or applications quickly.

Features
Biometric boarding in Brazil: benefits and how it works

Meet the new technology that is breaking new ground in airport security.

News
Cloud Observability: what it is and how to use it

How to use web application monitoring and microservices in BioPass ID cloud-based biometrics platform. Check it out!

How to use Postman to evaluate the quality of a facial biometrics

A quick guide on how to use Postman, an API testing tool, to evaluate the quality of facial biometrics.

Features
How to detect spoofing in facial biometrics with Postman

Learn how to use the Postman tool to detect possible spoofing attacks on facial recognition biometric authentication systems.

Features
How to detect and anonymize facial biometrics via Postman

Check out how to detect and anonymize facial biometrics using the Postman platform and the BioPass ID feature set.

Features
Proof of Life: learn more about Liveness 2D V2

Biometrics, liveness and BioPass ID: how these technologies can boost your company and applications in the world of Biometrics as a Service.

ABIS: what is it, and how does it work

Biometrics, ABIS and BioPass ID. How these technologies can boost your company and applications in the world of Biometrics as a Service.

Liveness: the technology used by INSS to prevent fraud

Do you know Liveness? Learn how this tool can enhance your everyday security.

Why should you use biometrics in the cloud

Learn how the connection between Cloud Computing and Biometrics can increase the competitivity of companies in today's market.

Biometrics
How to use Postman to match facial biometrics

Understand the match between biometrics, using the BioPass ID feature set and the Postman platform to make API requests.

How to test a biometric API using Postman

Learn how to test a few CRUD operations of biometric API using Postman platform.

4 steps to integrate a BioPass ID biometric API

Learn how to implement and manage BioPass ID API packages in just 4 steps.

How to register a user's facial biometrics via Postman

Understand how to enroll facial biometrics through the Postman platform.

Kubernetes: the technology that enables cloud applications

Learn how BioPass ID uses Kubernetes, Containers, and cloud-native applications in its infrastructure.

Certify processes with the Analytics API

The Analytics API pack provides technology lenses that count people inside vehicles as well as in classrooms.

Online fraud: prevention tips with biometric validation

As our security advances, hackers also evolve their strategies. Do you know how to protect yourself from them?

Does biometrics contribute to trustworthy digital accounts?

As it seems, digital accounts are here to stay, but did biometrics contribute to this achievement?

What does the Roman Empire and biometrics have in common?

Did you know that the Roman Empire and biometrics have something in common? Yes, in concern for information security.

Data security: get better results with biometrics

Nowadays, with the amount of people connected, we care about the security of our data. Biometric correspondence can help with that.

Facial recognition is already being used in condos

Facial recognition technology is already being used in condos around the world as a way to ensure security and validate the entry of residents. Read this text to see how this process works.

How to prevent fraud using biometrics

Biometrics is an excellent security and validation tool, but you need to be aware of possible frauds. Read this text and learn more about it.

Learn the requirements of the ICAO standard (ISO 19794-5)

Learn about the characteristics of the icao standard for using facial recognition technology at airports.

How does facial biometrics help to keep your data safe?

Facial biometrics was one of the greatest security tools used in the pandemic.

What is the difference between API and SDK?

Understand the main differences between API and SDK, two technological tools often used by developers in applications.

What is cyber security?

Understand how cyber security works and how it can protect your data.

Do you really know how biometrics work?

Check out the news about the universe of biometrics, which develop and is integrated more and more in the daily life of the population.

What is an SDK?

SDK is a tool widely used in the technological environment. Learn more about it and learn how it can help you develop your applications.

How does facial biometrics work on public transportation

Facial biometrics has already been used in public transportation in some parts of the world. Learn how this technology can optimize the life of your users.

What is an API?

Understand what an API is, how it works, and where it runs in biometric applications.

Learn about multifactor authentication with multibiometrics

Understand how multi-factor authentication ensures full security and provides a good experience for your users.

Have you ever paid for your lunch with facial recognition?

As technology modernizes, new forms of access and payment are also created, and one of these possibilities is to pay with facial recognition.

Increase the security of your onboarding with Biometric Qualification

Onboarding is increasingly present in our lives, and as such, it is important to invest in increasing your security with biometric qualification.

Security flaws tendencies for 2022

From ransomware to identity management, learn about the main security flaws for 2022.

Using Facial Recognition in Videoconferences

Video conferencing is already part of our lives, but we need to pay attention to safety, imagine with the convenience of facial recognition?

Forget passwords, the future is passwordless

Who has never come across the event of forgetting a password? Forget it, the future is passwordless, contactless and frictionless.