Frequently Asked Questions
What is Biometric Intelligence and Identification Technologies (BI² Technologies)?
Biometric Intelligence and Identification Technologies (BI² Technologies) is a Plymouth Massachusetts based biometric identification consulting and technology firm that sells its proprietary systems into more law enforcement agencies then any other company in the United States. Currently, these systems are used to locate missing children and seniors as well as for multiple applications in the law enforcement arena ranging from inmate intake and booking to release tracking. Since the roll out of their first units in second quarter 2005, the company has become a high profile firm featured on national and local news networks, and print media for their efforts in finding lost people through their superior and advanced technology.
BI² Technologies has developed a proprietary software application that integrates with the leading hardware supplier of digital iris recognition cameras (Panasonic) and Iridian Technology’s recognition software to bring to law enforcement agencies leading edge and user friendly iris recognition technology.
What are Biometric Technologies
Biometrics are technologies that capture, store and automatically confirm the identity of people by comparing patterns of physical or behavioral characteristics in real time against enrolled computer records of those patterns. Leading biometric technologies accomplish this task by scanning patterns of the fingerprint, iris, Deoxyribonucleic Acid (DNA), face, hand, palm, signature, skin, dental or voice.
Biometric technologies are far superior to other common means of confirming identity, such as tokens (something one possesses) or passwords (something one knows). Tokens (drivers' licenses, for example) and passwords (Social Security numbers, for example) cannot ensure positive identification of a person. Tokens are routinely counterfeited and stolen. Passwords are routinely forgotten, left in plain sight, and stolen. Unlike tokens or passwords, biometric identifiers are inextricably linked to persons themselves and therefore cannot be forgotten, counterfeited, or stolen.
Biometrics help protect privacy by erecting a barrier between personal data and unauthorized access. Technically, biometric capture devices create electronic digital templates that are encrypted and stored and then compared to encrypted templates derived from "live" images in order to confirm the identity of a person. The templates are generated from complex and proprietary algorithms and are then encrypted using strong cryptographic algorithms to secure and protect them. Thus, standing alone, biometric templates cannot be reconstructed, decrypted, reverse-engineered, or otherwise manipulated to reveal a person's identity. In short, biometrics can be thought of as a very secure key: Unless a biometric gate is unlocked by using the right key, no one can gain access to a person's identity.
The demand for biometric technologies has increased significantly following the events of 9/11.
The Principals of BI² Technologies have been nationally recognized experts in the application of biometric technologies, particularly iris recognition biometric technologies and finger print technologies, for the public sector since 1995.
How Does Iris Recognition Work?
Iris recognition is based on the most mathematically unique biometric – the iris of the eye. The human iris is absolutely unique, even between twins or an individual's right and left eyes. The iris itself is stable throughout a person's life (approximately from the age of one). The physical characteristics of the iris do not change with age. None of the other biometric solutions, including fingerprint, facial recognition, retina scan, and voice recognition provide the level of accuracy, speed, or cost-effectiveness found with iris recognition technology.
Iris recognition biometric technology positively determines the identity of an individual by capturing a high-resolution digital photograph of the individual's iris. The unique features contained in the iris are compared against a database and the identity of the individual determined.
The technology is non-intrusive - the individual does not need to touch anything to use the system. Automatic voice prompting, auto focus, plus enrollment and recognition speed make the system easy to use. An individual is detected automatically upon approaching the digital camera. A glance at the camera lens from 3-10" distance allows the camera to photograph the iris image, which is digitally processed into an iris template. No PINs, passwords, or cards are required.
Iris recognition technology is strictly voluntary. Participants agree to enroll, thereby eliminating privacy concerns. The user voluntarily decides to participate in iris recognition for authentication by looking at the camera. They also must be within a designated capture zone, which is approximately 3-10 inches away from the camera. The technology cannot work without the explicit cooperation of the end-user. To verify the identity of an enrolled person, all they need to do is look into a camera for a few seconds. A video image is taken of their iris in a manner that is completely non-invasive and inherently safe – just like getting your picture taken with a digital camera. And, unlike other biometric technologies, there is no need to touch anything – thereby avoiding the possible spread of illness, i.e., SARS, colds, flu, etc.
Iris recognition is proven to have the highest biometric accuracy, with no false matches in over two million cross-comparisons, according to the Biometric Product Testing Final Report (19 March 2001, Center for Mathematics and Scientific Computing, National Physics Laboratory, U.K.).
What services does BI² provide?
BI² Technologies’ wholly owned subsidiaries, The Child Project, LLC and Senior SafetyNet, LLC develop, sell, design, implement, integrate and support specific iris recognition-based biometric technologies to locate and identify missing children and adults. Additional information on these products and services can be found at their links www.thechildproject.org and www.seniorsafetynet.org.
In addition to The Child Project and SeniorSafetyNet software, the Company also provides Iris recognition and Jail Management software to sheriffs across the nation.
Virtually every major Sheriff’s department or office in the nation operates pre-release and community-based treatment programs that require on-going supervision, and positive identification, of inmates who are preparing to, or have, re-entered the community. BI²’s Arrest, Intake, Booking, Release, and Visitor modules allow authorized staff to select either The Child Project or the Office’s correctional modules. The Arrest, Booking, Intake, Release, and Visitor modules operate on an entirely separate database and program.