White Paper
Biometric Solution Implementation
The Planning and execution of Identity Management and biometric systems are
critical elements to their successful implementation. Utilizing proven
methodology to delivering complex systems requires close coordination with
the customer and technology partners across all phases of project
implementation. Our Implementation Services include:
Definition
Business Needs
Deliverables
Project Boundaries
Success Criteria
Proposal
Scope
Milestones
Budget
Risks
Team
Detailed Planning
Implementation Plan
Training Plan
Integrating Plan
System Configuration Plan
Testing Plan
Budget
Critical Path
Execution
Software and Hardware Installation
Administrator Training
User and Supervisor Training
Testing of all Interfaces
Functionality Testing
Performance Testing
Accuracy Testing
Monitoring System Performance (Burn-in period)
Making Adjustment
Post Implementation Review
Close-out
Go Live
Turnover to Operation and Management
Validation of Requirements
System Testing
Dedicated and independent testing of all critical system components
Creating Test Cases, scenarios and Test Procedures for testing the
following:
Applications
Functions
Systems Performance
Load, Stress tests
Failover
Data backup
Verify that the delivered system components (Hardware and Software)
are fully compliant with the approved Bill of Materials (BOM).Accuracy Testing and calculation of False Acceptance Rate (FAR) and
False Rejection Rate (FRR)Writing Testing Plan documents
Security requirements
Biometric and Identity Management Systems must be highly secured
from both internal and external threats with different levels of
security and privileges. Our services include the validation of
security requirements to ensure that internal users are given the
appropriate level of security according to their role and function.
Also, system security will be validated against external threats to
ensure total system security. The security validation will include:Identifying all security features for all system
components, including:Security Specifications
Security Classifications and Security Standards
Security Architecture
System Security Plan
Risk assessment to identify potential system vulnerability and
identify a mitigation plan to offer the required level of
protection.
Performance requirements
Response Time:
Testing to ensure that all inquiries submitted transactions
to the system are completed within the specified time.Testing to ensure that all enrollment transactions
submitted to the system are completed within the specified
time.Ensure that Performance Test take into account whether
filtering is allowed. Test cases must ensure that system
sizing and system resources are configured to address the
system performance requirements.Ensure that the system is sized for the specified Peak
PerformanceEnsure that the system is sized for the specified business
hours. System sizing is configured differently for
different business (operational hours in the day).Performance testing will take into account the size of the
database specified in the RFPDifferent Types of Transactions (TOT) may have different
Response Time requirements. Testing will ensure addressing
specified requirements for all types of transactions (TOT).
Performance Testing will take into account response time under less
than optimum requirements. For example, the system may have one or
more of the search engine CPU’s down. Our testing approach takes
into account system performance under these conditions.Performance testing for fingerprint-capture workstations to ensure
that a set of fingerprints is completed under a specified time.Performance testing for editing tenprints or latents under a
specified time.Performance testing for the scanning of Tenprints or Latents under
the specified time.
Application Testing
Testing complex applications in an enterprise environment includes:
AFIS applications
AFIS performance and accuracy tests
Stress load tests, functionality test
Integration tests
Acceptance testing
Requirements Analysis
Test Plan Creation
Creating Test Cases
Defect Tracking
Using a standard application lifecycle management tool.
System Integration Testing
Performance (Stress and Load) testing
AFIS architecture and systems
Security and Intrusion Testing
Network Testing
Middleware Application Testing
Client Application Testing
Device integration and data verification
Performing Data Retrieval and Verification
Tracking Testing Metrics
Writing Testing Result Reports and recommendations
Coordinating all System Acceptance Testing with the Client, vendors
and suppliersReview of System Acceptance Test Plan(s). System Acceptance Test
Plan(s) must include:Master Software Test Plan(s).
Test Cases and Test Scripts.
Performance Testing Scenarios.
Accuracy Testing Plan(s).
System load and balance Test Plan(s).
AFIS searches and matching Testing Scenarios.
System Integration Testing Scenarios.
Middleware Testing Scenarios.
Failover Testing Scenarios.
Client Application Testing Scenarios.
Review of All supporting documentation, including
System Requirement Specification(s)
System Acceptance Test Plan(s)
Coordinating all System Acceptance Testing with the Client, vendors
and suppliersReview of System Acceptance Test Plan(s). System Acceptance Test
Plan(s) must include:Master Software Test Plan(s).
Test Cases and Test Scripts.
Performance Testing Scenarios.
Accuracy Testing Plan(s).
System load and balance Test Plan(s).
AFIS searches and matching Testing Scenarios.
System Integration Testing Scenarios.
Middleware Testing Scenarios.
Failover Testing Scenarios.
Client Application Testing Scenarios.
Review of All supporting documentation, including
System Requirement Specification(s)
System Acceptance Test Plan(s)