SlideShare a Scribd company logo
1 of 25
Aadhaar Technology Srikanth Nadhamuni Head of Technology UID Authority of India Technology Centre, Bangalore
Enrolment DDSVP – Demographic Data Standards Biometric Standards – Fingerprint, Iris, Photo Enrolment Device Standards ABIS APIs Device VDM standards Authentication  Auth Device Standards Authentication APIs Process Registrar Onboarding Kit Operator Training Continuous Improvement Process Standards Based
5
Aadhaar Biometric Capture Device API 6
Aadhaar ABIS API Aadhaar Biometric SDK 7
Aadhaar Auth API Aadhaar Auth Device Spec 8
Data Standards Demographic Data Standards Demographic Data Address Data Standards http://uidai.gov.in/UID_PDF/Committees/UID_DDSVP_Committee_Report_v1.0.pdf Biometric Data Standards http://uidai.gov.in/UID_PDF/Committees/Biometrics_Standards_Committee_report.pdf 9
Architecture Principles ,[object Object],No vendor lock-in across the system Use of open-source technologies wherever prudent Multi-Platform Support – Linux, Microsoft 10
Arch/Design Choices SEDA (Staged Event Driven Architecture) allows smarter failure handling Fully distributed compute platform Highly asynchronous using a high speed messaging layer Data sharded across RDBMS and DFS over distributed platform 11
Fingerprints : concepts and principles ,[object Object]
Ridges ending and bifurcations are creating some characteristics known as minutiae 3 levels used for the biometric engine: ,[object Object]
    Orientation, pattern, focal areas (Core, delta), …
Level 2: ridge path  matching
    Features vectors (Minutiae)
    Ridge ending, bifurcation…
Level 3: ridge features  Verification / Future matching
    Pores, ridges shapes, scars …,[object Object]
Iris is made of colored tubes
Iris contains a biometric pattern
Rings, furrows, freckles and the corona
Features and their location3 steps for the biometric engine: ,[object Object]
The border of the iris is searched
Apply Gabor transformation,[object Object]

More Related Content

Viewers also liked

Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uidAjit Dadresa
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres Regunath B
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagationRegunath B
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaarRegunath B
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantomRegunath B
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsRegunath B
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Regunath B
 
Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsRegunath B
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantageRegunath B
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 

Viewers also liked (14)

Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uid
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres
 
What database
What databaseWhat database
What database
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagation
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaar
 
Uid
UidUid
Uid
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantom
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streams
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3
 
Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systems
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantage
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 

Similar to Srikanth Nadhamuni

AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainIRJET Journal
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
Stork Webinar | Digital Transformation Assessment
Stork Webinar | Digital Transformation AssessmentStork Webinar | Digital Transformation Assessment
Stork Webinar | Digital Transformation AssessmentStork
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
IRJET- Geo-Based Smart Parking Automation System
IRJET-  	  Geo-Based Smart Parking Automation SystemIRJET-  	  Geo-Based Smart Parking Automation System
IRJET- Geo-Based Smart Parking Automation SystemIRJET Journal
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTIRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingMobileMonday Estonia
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceEduserv Foundation
 

Similar to Srikanth Nadhamuni (20)

AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Stork Webinar | Digital Transformation Assessment
Stork Webinar | Digital Transformation AssessmentStork Webinar | Digital Transformation Assessment
Stork Webinar | Digital Transformation Assessment
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Uid security
Uid securityUid security
Uid security
 
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Geo-Based Smart Parking Automation System
IRJET-  	  Geo-Based Smart Parking Automation SystemIRJET-  	  Geo-Based Smart Parking Automation System
IRJET- Geo-Based Smart Parking Automation System
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Avi solution2
Avi solution2Avi solution2
Avi solution2
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-Science
 

More from eletseditorial

More from eletseditorial (20)

Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011
 
3 d technology in education :: Podar International School
3 d technology in education :: Podar International School3 d technology in education :: Podar International School
3 d technology in education :: Podar International School
 
Nalini Chandran, Director
Nalini Chandran, Director Nalini Chandran, Director
Nalini Chandran, Director
 
Rachna Swarup
Rachna Swarup Rachna Swarup
Rachna Swarup
 
Murli K S
Murli K S Murli K S
Murli K S
 
Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal, Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal,
 
Mark Parkinson
Mark Parkinson Mark Parkinson
Mark Parkinson
 
Nagraj G Honnekeri
Nagraj G Honnekeri Nagraj G Honnekeri
Nagraj G Honnekeri
 
Shraman Jha
Shraman Jha Shraman Jha
Shraman Jha
 
Dr Melor Md yunus
Dr Melor Md yunus Dr Melor Md yunus
Dr Melor Md yunus
 
Dinesh Kumar
Dinesh Kumar Dinesh Kumar
Dinesh Kumar
 
Veena Raizada
Veena Raizada Veena Raizada
Veena Raizada
 
Amit Gupta
Amit Gupta Amit Gupta
Amit Gupta
 
Dr Anita Priyadarshini
Dr Anita Priyadarshini Dr Anita Priyadarshini
Dr Anita Priyadarshini
 
Dr Anjalee Prakash
Dr Anjalee Prakash Dr Anjalee Prakash
Dr Anjalee Prakash
 
Son Kuswadi
Son Kuswadi Son Kuswadi
Son Kuswadi
 
Mr. Raj Grover
Mr. Raj Grover Mr. Raj Grover
Mr. Raj Grover
 
Mr. Manish Upadhyay
Mr. Manish Upadhyay Mr. Manish Upadhyay
Mr. Manish Upadhyay
 
Dr Thomas Christie
Dr Thomas Christie Dr Thomas Christie
Dr Thomas Christie
 
Prof K R Srivathsan
Prof K R Srivathsan Prof K R Srivathsan
Prof K R Srivathsan
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Srikanth Nadhamuni

  • 1. Aadhaar Technology Srikanth Nadhamuni Head of Technology UID Authority of India Technology Centre, Bangalore
  • 2.
  • 3.
  • 4. Enrolment DDSVP – Demographic Data Standards Biometric Standards – Fingerprint, Iris, Photo Enrolment Device Standards ABIS APIs Device VDM standards Authentication Auth Device Standards Authentication APIs Process Registrar Onboarding Kit Operator Training Continuous Improvement Process Standards Based
  • 5. 5
  • 7. Aadhaar ABIS API Aadhaar Biometric SDK 7
  • 8. Aadhaar Auth API Aadhaar Auth Device Spec 8
  • 9. Data Standards Demographic Data Standards Demographic Data Address Data Standards http://uidai.gov.in/UID_PDF/Committees/UID_DDSVP_Committee_Report_v1.0.pdf Biometric Data Standards http://uidai.gov.in/UID_PDF/Committees/Biometrics_Standards_Committee_report.pdf 9
  • 10.
  • 11. Arch/Design Choices SEDA (Staged Event Driven Architecture) allows smarter failure handling Fully distributed compute platform Highly asynchronous using a high speed messaging layer Data sharded across RDBMS and DFS over distributed platform 11
  • 12.
  • 13.
  • 14. Orientation, pattern, focal areas (Core, delta), …
  • 15. Level 2: ridge path  matching
  • 16. Features vectors (Minutiae)
  • 17. Ridge ending, bifurcation…
  • 18. Level 3: ridge features  Verification / Future matching
  • 19.
  • 20. Iris is made of colored tubes
  • 21. Iris contains a biometric pattern
  • 22. Rings, furrows, freckles and the corona
  • 23.
  • 24. The border of the iris is searched
  • 25.
  • 26. Enrolment Rate - Modeling
  • 28. Aadhaar Authentication YES OR NO = + Demographics NAME, GENDER DOB, Address PIN / OTP Any or All
  • 30. Authentication API 19 XML over HTTP(s) -Stateless Transaction security & Audit Specifications http://uidai.gov.in/images/FrontPageUpdates/aadhaar_authentication_api_1.2_4dec.pdf (version 1.2) http://uidai.gov.in/images/FrontPageUpdates/Aadhaar_Authentication_API_1.5.pdf (version 1.5)
  • 31. Visibility & Transparency Public Portal Enrolment Rate EID Check Partner Portal Operator Activation Developer Portal Dev resources - APIs, code samples 20
  • 32.
  • 33.
  • 34. 23
  • 35. 24

Editor's Notes

  1. In few years, we expect the basic infrastrcuture in place. Infrastructure includes no-frills bank account when Ram got his UID number. We also expect banking system to incrporate UID number in their system and complete interbank transfer using UID #.As his attendance data is processed, throug NREGA scheme, weekly payment will be directly deposited through interbank system to his bank account. If there is a mobile phone number tied to his UID #, he will be notified of the deposit.More importantly, usign his biometric, he can withdraw money through local bank representatives in the village.Entire process will be near instantenous and without any intermediate agents.