BioLink AFIS Key Features
BioLink AFIS/APIS is a multifactor, scalable, fully NIST- and FBI-compliant fingerprinting system that allows to perform a wide range of tasks for processing, editing, searching, retrieving, and storing fingerprint images and subject records. Architecture of automatic fingerprint identification system includes a variety of configurations - from a desktop AFIS to distributed networked solutions for local, regional, and national systems. As one of the most accurate and high-performance automated fingerprint identification systems in the world, BioLink's Criminal AFIS offers a large number of features:
Global trusted BioLink's AFIS fingerprint algorithms of filtering, encoding and matching ensure highest reliability and accuracy for law enforcement fingerprinting. The BioLink's coding technology provides perfect recognizing of ridge patterns as well as detecting and describing of minutiae (coordinates, orientation, ridge counts and ridgewise relations).
Input of tenprints into the system is achieved via LiveScan devices. During this process, the system defines the print boundaries, integral features (loops, deltas, whorls, types of patterns), minutiae points (beginnings or endings of papillary lines, bifurcation of lines, islands, spurs, etc.), as well as poor quality areas.
The images of prints are encoded (checked for special features used in matching) automatically. The full electronic tenprint card contains alphanumeric descriptive information, rolled and plain fingerprints, palmprints, classification formula, mugshots, SMT photos, and verbal portrait.
Input of latent prints can be performed from photos or transparent dactyloscopic films through flatbed scanners, as well as from any other data storage via video input device. Latent print encoding is done in an interactive mode, i.e. an operator can control any stage of the encoding process and, if necessary, correct either the integral features allocation or the pattern skeleton. Detection of a complete set of features is done automatically based on the pattern skeleton.
The process of input of tenprints and latent prints is completed with the entry of text information. This information consists of the basic data (ID, crime description, police department, etc.) and complementary data (details about a person, etc.). Access to dictionaries makes text data entry a straightforward process.
BioLink AFIS performs the following types of searches:
tenprint/latent,
tenprint/tenprint,
latent/tenprint, and
latent/latent. Automatic creation of a search query with standard query parameters can be set up for every new tenprint and latent print entry. A search query with either standard or arbitrary parameters can also be made for any tenprint and/or latent print from the existing database.
A search can also be performed through the whole database or a particular part of it according to some specific conditions, such as the region, type of crime, age, etc. Formed queries are set in a queue for search. An operator can control the queries, change their priority and, if necessary, delete the queries before the search begins. As a result, the recommended list of probable candidates is generated.
System’s data exchange format fully complies with the requirements of the ANSI-NIST-ITL 1-2007 standard. The BioLink AFIS/APIS supports the following implemented versions: FBI CJIS- RS-0010 (v. 7), INTERPOL (INT-I) (v. 4)
Any communication channel providing IP connection (telephone lines, wireless channels, optic-fiber or cellular network, etc.) can be used for data transmission.
BioLink AFIS provides the ability of remote entry of fingerprint and palm print data, as well as remote access to a Central Database.
The BioLink AFIS/APIS allows for bringing the textual part of the database out onto the Oracle server providing thereby the openness of the AFIS/APIS to other information systems. All changes in the alphanumeric data stored in the AFIS/APIS database are synchronously replicated in the Oracle server.
- Data protection against any unauthorized modification, as well as against either intentional or accidental corruption in every stage of data processing, storage, or transmission
- Authentication of users engaged in data interchange (notarization of both the sender and the recipient)
- Distribution of privileges among the users and maintenance staff to access any information resources available in the system
- Tracking of illegal operations that the AFIS/APIS users and maintenance staff might perform
- Replication of data by making backup copies