Page 38 - Automated Fingerprint Identification Systems (AFIS)
P. 38
INTRODUCTION 23
cant difference, of course, is that in the AFIS check, finger images are the
authenticating instruments.
1.12 CHAPTER OVERVIEW
The chapters of this book are intended to appeal to a wide audience. While the
topic is AFIS, the concepts and descriptions apply to other areas of identifica-
tion and biometric technology. There is a chapter describing the identification
process, one on the history of AFIS, and one on the uniqueness of fingerprints.
Also included is a chapter on other biometric identifiers, such as hand geom-
etry and DNA. Administrators who are considering the purchase of an AFIS or
an upgrade to their existing system may find several other sections useful. The
chapter on AFIS acquisition describes the legal requirements for an AFIS pur-
chase, including contracting requirements. Another chapter describes the doc-
umentation essential for a successful implementation. While the AFIS system
moves to the gradual elimination of paper, paper documents remain essential
for the purchase, testing, and installation of an AFIS system.
The book also contains a chapter on contractual requirements for public
officials. While written with the focus of an AFIS purchase, the concepts are
valuable for any large public sector procurement. The distinctions between
requests for proposal and requests for information are covered in terms that
are easy to understand. Decisions made have to meet policy, regulation, and
the law, as well as withstand public scrutiny.
This book contains information about fingerprints as they relate to AFIS
systems. After all, fingerprints are the basis of AFIS systems. For more infor-
mation on fingerprints, the reader can refer to the work by Ed German,
available at http://www.onin.com, which is authoritative and masterful. Other
books on the market, such as David Ashbaugh’s Quantitative-Qualitative Friction
Ridge Analysis, provide detailed information on fingerprints. As mentioned,
this book briefly describes other biometrics used in identification, but a more
complete review of this topic can be found in Biometrics Identity Assurance in the
Information Age by John Woodward, Nicholas Orlans, and Peter T. Higgins
(a contributor to this book), which addresses the various biometric techniques
in use.
The remaining chapters in this book cover everything from an overview of
how AFIS systems operate to practical information for purchasing an AFIS
system, such as the documents suggested and legal responsibilities. While pre-
sented in the context of an AFIS system, these concepts have applications in
virtually any area involving public monies and vendor products. The following
is a brief overview of each chapter.