White Paper

Biometric Solution Implementation

The Planning and execution of Identity Management and biometric systems are
critical elements to their successful implementation. Utilizing proven
methodology to delivering complex systems requires close coordination with
the customer and technology partners across all phases of project
implementation. Our Implementation Services include:

  • Definition

    • Business Needs

    • Deliverables

    • Project Boundaries

    • Success Criteria

  • Proposal

    • Scope

    • Milestones

    • Budget

    • Risks

    • Team

  • Detailed Planning

    • Implementation Plan

    • Training Plan

    • Integrating Plan

    • System Configuration Plan

    • Testing Plan

    • Budget

    • Critical Path

  • Execution

    • Software and Hardware Installation

    • Administrator Training

    • User and Supervisor Training

    • Testing of all Interfaces

    • Functionality Testing

    • Performance Testing

    • Accuracy Testing

    • Monitoring System Performance (Burn-in period)

    • Making Adjustment

    • Post Implementation Review

  • Close-out

    • Go Live

    • Turnover to Operation and Management

Validation of Requirements

System Testing

  • Dedicated and independent testing of all critical system components

  • Creating Test Cases, scenarios and Test Procedures for testing the
    following:

    • Applications

    • Functions

    • Systems Performance

    • Load, Stress tests

    • Failover

    • Data backup

  • Verify that the delivered system components (Hardware and Software)
    are fully compliant with the approved Bill of Materials (BOM).

  • Accuracy Testing and calculation of False Acceptance Rate (FAR) and
    False Rejection Rate (FRR)

  • Writing Testing Plan documents

Security requirements

  1. Biometric and Identity Management Systems must be highly secured
    from both internal and external threats with different levels of
    security and privileges. Our services include the validation of
    security requirements to ensure that internal users are given the
    appropriate level of security according to their role and function.
    Also, system security will be validated against external threats to
    ensure total system security. The security validation will include:

    1. Identifying all security features for all system
      components, including:

      1. Security Specifications

      2. Security Classifications and Security Standards

      3. Security Architecture

      4. System Security Plan

  2. Risk assessment to identify potential system vulnerability and
    identify a mitigation plan to offer the required level of
    protection.

Performance requirements

  1. Response Time:

    1. Testing to ensure that all inquiries submitted transactions
      to the system are completed within the specified time.

    2. Testing to ensure that all enrollment transactions
      submitted to the system are completed within the specified
      time.

    3. Ensure that Performance Test take into account whether
      filtering is allowed. Test cases must ensure that system
      sizing and system resources are configured to address the
      system performance requirements.

    4. Ensure that the system is sized for the specified Peak
      Performance

    5. Ensure that the system is sized for the specified business
      hours. System sizing is configured differently for
      different business (operational hours in the day).

    6. Performance testing will take into account the size of the
      database specified in the RFP

    7. Different Types of Transactions (TOT) may have different
      Response Time requirements. Testing will ensure addressing
      specified requirements for all types of transactions (TOT).

  2. Performance Testing will take into account response time under less
    than optimum requirements. For example, the system may have one or
    more of the search engine CPU’s down. Our testing approach takes
    into account system performance under these conditions.

  3. Performance testing for fingerprint-capture workstations to ensure
    that a set of fingerprints is completed under a specified time.

  4. Performance testing for editing tenprints or latents under a
    specified time.

  5. Performance testing for the scanning of Tenprints or Latents under
    the specified time.

Application Testing

  1. Testing complex applications in an enterprise environment includes:

    1. AFIS applications

    2. AFIS performance and accuracy tests

    3. Stress load tests, functionality test

    4. Integration tests

Acceptance testing

    1. Requirements Analysis

    2. Test Plan Creation

    3. Creating Test Cases

    4. Defect Tracking

    5. Using a standard application lifecycle management tool.

    6. System Integration Testing

    7. Performance (Stress and Load) testing

    8. AFIS architecture and systems

    9. Security and Intrusion Testing

    10. Network Testing

    11. Middleware Application Testing

    12. Client Application Testing

    13. Device integration and data verification

    14. Performing Data Retrieval and Verification

    15. Tracking Testing Metrics

    16. Writing Testing Result Reports and recommendations

  1. Coordinating all System Acceptance Testing with the Client, vendors
    and suppliers

  2. Review of System Acceptance Test Plan(s). System Acceptance Test
    Plan(s) must include:

    1. Master Software Test Plan(s).

    2. Test Cases and Test Scripts.

    3. Performance Testing Scenarios.

    4. Accuracy Testing Plan(s).

    5. System load and balance Test Plan(s).

    6. AFIS searches and matching Testing Scenarios.

    7. System Integration Testing Scenarios.

    8. Middleware Testing Scenarios.

    9. Failover Testing Scenarios.

    10. Client Application Testing Scenarios.

  3. Review of All supporting documentation, including

    1. System Requirement Specification(s)

    2. System Acceptance Test Plan(s)

  4. Coordinating all System Acceptance Testing with the Client, vendors
    and suppliers

  5. Review of System Acceptance Test Plan(s). System Acceptance Test
    Plan(s) must include:

    1. Master Software Test Plan(s).

    2. Test Cases and Test Scripts.

    3. Performance Testing Scenarios.

    4. Accuracy Testing Plan(s).

    5. System load and balance Test Plan(s).

    6. AFIS searches and matching Testing Scenarios.

    7. System Integration Testing Scenarios.

    8. Middleware Testing Scenarios.

    9. Failover Testing Scenarios.

    10. Client Application Testing Scenarios.

  6. Review of All supporting documentation, including

    1. System Requirement Specification(s)

    2. System Acceptance Test Plan(s)