UID project gets volunteers from IT firms!
Economy to grow by 7.5% this fiscal, over 8 in next: FM
Share |
New Delhi: India's economy is poised to grow by 7.5% this fiscal and will top 8% in the next on the back of a strong industrial recovery, finance minister Pranab Mukherjee said.
The Industrial Production figures suggest the economy will grow by 7.5% this fiscal and perhaps over 8% in the next fiscal, Mukherjee told reporters here.
The Index of Industrial Production, or the measure of the country's factory output, surged to a 16-year-high of 16.8% in December, led by a robust performance by manufacturing, particularly consumer durables, indicating that demand was picking up across sectors.
Analysts say the industry is set for a good showing in January as well. Research services provider Dun &Bradstreet expects industrial production to have grown by 13.5-14.5% for the month.
D&B revised upwards its growth forecast for the third quarter to 7.3% yesterday after taking into account the stunning performance by the industry.
"We have revised our GDP forecast for Q3 to 7.3%, from the earlier 6.8%, given the buoyancy witnessed in industrial activity in this quarter," D&B said in a release here today.
UID project gets volunteers from IT firms
!The government's unique identification (UID) project has received support from the IT-BPO industry body Nasscom, with some member companies sending IT professionals for bringing in innovation."We had requested Nasscom to send IT professionals on sabbatical from member firms who are willing to take part in the UID project. The project is massive and one of its kind in the world, and it would be nice to have innovation from the IT talent in India," Nandan Nilekani, chairman of UID authority of India, said at the Nasscom summit in India.
"We received a request from UIDAI about a month ago. The request was first forwarded to about 100 IT firms in India. Subsequently, we sent the request to all the 1,300 Nasscom members. In fact, the first two resumes we got were from a little known IT firm in Kerala. We have sent 15 resumes to UIDAI chairman," Nasscom president Som Mittal said.
The information technology veteran said that in India, the 'model' has changed, from "roti, kapada, makaan" (food, clothing, shelter) in the 1960s and 1970s, to the slogan in the last several years of "bijli, sadak, pani" (power, roads, water).
"Today, it's all virtual things ? it's about UID (unique identification) number, mobile phone and bank account," Nilekani, best known for his role in building Infosys, said after Citizen Extraordinaire Award 2010, instituted by the Prestige Group in association with Rotary Bangalore Midtown, here last night.The slogan of "bijli, sadak, pani" is pass?; 'virtual things' like UID number, bank account and mobile phone are the in-thing, says Chairman of Unique Identification Authority of India Nandan M Nilekani.
The information technology veteran said that in India, the 'model' has changed, from "roti, kapada, makaan" (food, clothing, shelter) in the 1960s and 1970s, to the slogan in the last several years of "bijli, sadak, pani" (power, roads, water).
"Today, it's all virtual things ? it's about UID (unique identification) number, mobile phone and bank account," Nilekani, best known for his role in building Infosys, said after Citizen Extraordinaire Award 2010, instituted by the Prestige Group in association with Rotary Bangalore Midtown, here last night.
The award function was organized by Prestige Group in association with Rotary Bangalore, Midtown.
Chairperson of the Unique Identification Authority of India, Nilekani said his link with Bangalore dates back to his birth at the Vani Vilas Hospital and early education at Bishop Cotton School.
"Nearly 75 million people in the country are still homeless and don't have an address. This is why they lose out on a host of benefits. Identity has created a barrier. At the same time, migration is increasing," he added.
Nilekani said more and more money is being spent on public welfare. He cited projects like the National Rural Employment Guarantee Scheme, on which Rs 39,000 crore has been spent, and the right to education on which Rs 1.71 lakh is being spent. The right to food, which is about to be implemented, also involves crores. "As India develops, social programmes targeted at individuals will increase. We need a robust way of identifying individuals who are geniuely poor and not getting any benefits," he said.
The first part of the UID project involves enrolling everyone at stations where people can give thumb impressions, get their iris scanned and photograph taken. In the next 5 years, around 600 million people are likely to be covered. "A foundation of soft infrastructure is important. In the 60s and 70s, the slogan was Roti-Kapda-Maakan. Later, it became Bijili-Sadak-Paani. Now, it has become UID, mobile phones and bank accounts. This project has a lot of socio-economic implications," Nilekani added.
Prestige Group MD Irfan Razack said: "If being Bangalored is an international buzzword today, Nilekani is among those responsible for it. From pensioner's paradise, he has transformed this city to the epicentre of information technology revolution."
ENJOY V-DAY: GUV TO YOUNGSTERS
Echoing young Bangaloreans' sentiments, governor H R Bhardwaj said: "I really wish I could drive across the city on Valentine's Day. There are a lot of people who are silent spectators. Youngsters have the right to celebrate whatever they want to. I don't need to advise anyone. There is no harm in going to clubs or coffee shops. They need not fear. I am in constant touch with the police. Everything is safe."
The governor raised concerns about communal problems. "Every day, there is a new problem. Youngsters need to become modern citizens, and communal harmony is important," he said.
-
EMC sets eye on UID project - CIOL News Reports
16 Dec 2009 ... EMC sets eye on India's UID project. Says the company has the right kind of technology and infrastructure in place to support the scale that ...
www.ciol.com/News/News-Reports/EMC...Indias-UID-project/.../0/ - Cached -
India : Unisys to partner local IT companies to bid for UID ...
Free Online Library: India : Unisys to partner local IT companies to bid for UID project. by "TendersInfo"; Construction and materials industries.
www.thefreelibrary.com › ... › TendersInfo › November 22, 2009 - Cached -
What's Next for India's Epic UID Project? | News | Automation World
India's ambitious Unique Identification Card (UID) project is expected to improve ... information technology companies seem to think it will be profitable. ...
www.automationworld.com/news-6405 - Cached -
Leak fuels fears over India's ID project - Asia Times Online ...
20 Nov 2009 ... Launched this February, the UID project primarily targets disadvantaged people. "In India, an inability to prove identity is one of the ...
www.atimes.com/atimes/South_Asia/KK20Df07.html - Cached -
Unisys to partner local IT companies to bid for UID project ...
21 Nov 2009 ... "We are in advance talks with TCS, Wipro and Tech Mahindra for a local partnership to bid for the national UID project of India. ...
economictimes.indiatimes.com/...IT-companies...UID-project/.../5252973.cms - Cached -
Yahoo! sets eyes on India's UID project
12 Nov 2009 ... Yahoo! sets eyes on India's UID project. Leslie D'Monte / New Delhi November 12, ... It only has investments in some internet companies). ...
www.business-standard.com › Home › ICE World - Cached -
National Population Register (NPR) of India: All about Nilekani's ...
25 Jun 2009 ... The UID (Unique Identity) project is one of the most ambitious projects of the UPA government. The move to set up the UID Authority of India ...
nprindia.blogspot.com/.../all-about-nilekanis-uid-project.html - Cached - Similar -
Yahoo Jobs On UID Project | MoneyMint.in - India Business Blog
13 Nov 2009 ... Seems its going to bid for the UID project along with its subsidiary ... Telecom Towers and Tower Companies Consolidation in India – Indus ...
www.moneymint.in/tag/yahoo-jobs-on-uid-project - Cached -
Now Google Expresses Interest In UID – How Will The Project ...
13 Nov 2009 ... Yahoo – Cisco Express Interest In India's UID Project – Would ... I am a Business Development manager with an IT company and have been a ...
www.watblog.com/.../google-expresses-interest-in-uid-how-will-the-project-benefit-from-this/ - Cached -
Microsoft, Yahoo set eyes on India's UID project - SiliconIndia
Microsoft, Yahoo set eyes on India's UID project - New Delhi: It seems that ... 4: Now big Companies are in race to get this project.but in my opinion we ...
www.siliconindia.com/.../Microsoft_Yahoo_set_eyes_on_Indias_UID_project-nid-62799.html - Cached
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next |
Invitation to the Developer Community
to contribute to the development of
Enrolment Software for UIDAI
Unique Identification Authority of India (UIDAI/ Authority) has been setup by the Government of India
with a mandate to issue Unique Identification numbers (UIDs/ UID Numbers) to all the residents in
the country. UIDAI proposes to create a platform to enroll the residents of the country in order to
issue UID Numbers. These numbers may then be used for authentication. This can be used by
several government and private organizations for better delivery of services to residents. The
purpose of the UIDAI is to issue UID Numbers that are (a) robust enough to minimize / eliminate
duplicate and fake identities, and (b) can be verified and authenticated in an easy, cost effective
way. Details of the UIDAI approach are contained in the document titled "Creating unique Identity
Number for every Resident in India" which is available at http://www.uidai.gov.in/documents/Creating a
unique identity for every resident in India.pdf
UIDAI will use common demographic and biometric data for establishing and verifying identity,
therefore, it becomes essential to standardize these data fields and verification procedures across
its registering partners (Registrars). The details of the demographic fields and their structure have
been finalized by the Authority and are contained in the report of the Data Standards and Verification
Procedure Committee available at
http://www.uidai.gov.in/documents/UID_DDSVP_Committee_Report_v1.0.pdf . Specifications and
other details of the biometric attributes may be seen in the Report of the Biometric Committee at
http://www.uidai.gov.in/documents/Biometrics_Standards_Committee_report.pdf The Authority will
be collecting the photograph, all ten finger images and iris scan of both the eyes.
The demographic and biometric information will be collected by the Registrars of the UIDAI. The
Registrars will be the agencies of the State and Central Government and some other entities that, in
normal course of their activities, interact with the residents. It is expected that the actual data collection
from the residents will take place with the help of the Enrolling Agencies which will be hired by the
Registrars. These enrolling agencies will send the information collected from the residents to the UIDAI's
Central Database (called the Central Identities' Repository – CIDR) in a batch mode, probably at the end
of each day electronically. These enrolment requests will be processed at the CIDR and the CIDR will
issue UIDs to those residents whose records are complete ( in terms of quality of biometric images and
demographic information) and whose biometric attributes do not exist in the database ( i.e. these are
not 'duplicates'). This information will be sent by the Authority to the individuals directly and also the
concerned Registrar.
For enrolling residents into the UID System, the Authority will require necessary enrolment software
(called the "Client Software"). This Client Software should be capable of (i) Entry of demographic fields
(ii) Simultaneous transliteration and correction in one local language besides English (iii) integrating the
biometric devices (camera, Fingerprint scanner and Iris image capture camera), (iv) storing the data in a
secure way and (v) transmitting the data to the CIDR in a secure manner. There are many other
requirements which are described on Page 28 (section "Enrolment Module") in "UID Application
Overview and Requirements" document available at
http://uidai.gov.in/tenders/RFP_ASDMSA_Volume_II.pdf
As the Client Software will be required for multiple standard Operating Systems (Windows, Linux, Mac),
the Authority will require that the Client software should be capable of running on multiple Operating
Systems. Alternatively, there can be different version of the Client Software made for different
Operating Systems.
We believe that a National project of this magnitude and importance cannot be implemented without
the active support and involvement of people at various levels and in varying degrees – communicating
the message of the UID to encouraging enrollment and monitoring implementation.
Similarly, we seek voluntary support of the software development community in building the Client
Software. This is an invitation to the Community of developers to contribute to this important National
Mission and develop the Client Software. Currently the Authority is seeing Client Software developed for
any of the standard operating systems in standard development languages (eg. Java, C++ or C#).
Developers may also develop some specific modules (an example, transliteration module, address
normalization module) that can be integrated with the Client Software through well-defined APIs. In the
coming days, the Authority will define these APIs and provide further details as part of system design.
In order to define a productive and conducive environment for this collaborative effort, following Rules
are proposed:
1. Any Company or an existing open source project and even individual developers (each of these
categories will, henceforth, be described as Developer) may volunteer to undertake the
development of the entire Client Software or a module of it.
2. When a Developer undertakes to develop the Client Software or a module of it, the Developer
should inform the Authority. The Authority will give the Developer a registration number
(Registered Developer). This will, however, be given only to those who, in the opinion of the
Authority, demonstrate a potential for positive contribution to the achievement of the
objective.
3. The Registered Developers may seek answers and participate in discussions among other
registered developers and/or with UIDAI regarding the software specifications and requirements
using the collaboration environment setup by the Authority during the course of software
development cycle.
4. Authority is under no obligation to accept the ideas and codes developed. Acceptance and
evaluation of the codes submitted is at the sole discretion of the Authority. Further, the
Authority does not make any guarantees with respect to answering questions within a
prescribed time.
5. When a Registered Developer feels that the software or a module is fit for trials by the
Authority, the source-code may be submitted to the Authority along with the Manual and other
documentation using the code submission tools and procedures setup by the Authority. If the
Authority is of the view (in its sole discretion and assessment) that the code developed could be
useful to the UID project, the Authority may ask for further help from the concerned Registered
Developer in improving the functionality or any other aspect as deemed necessary. The
Registered Developer may be invited by the Authority to give the final shape to the product.
6. If the Client Software or a module developed by any Developer is accepted by the Authority for
implementation in the field for enrolment, the contribution of the Registered Developer will be
recognized. However, the source code, documentation and IPR will belong to the Authority.
Accordingly, the Registered Developer will be required to enter into appropriate agreements
transferring all rights and intellectual property to the Authority for their product and
contribution.
7. This effort for creation of the enrollment software is completely voluntary and the Authority is
under no obligation to provide any financial incentive or consideration to the concerned
Registered Developer for the product.
8. The use of design / drawings/ or any other material by the developer in writing the enrolment
software shall be fully at the risk and liability of the developer. UIDAI shall not be liable for IPR
violation on this account and shall not be made a party to any court proceeding on this account.
9. The Authority reserves the right to open source any part or in full, any of these components and
contributions in the future for the betterment of the community.
10. The Authority reserves the right to change/ cancel any specification, requirement, change tools,
architecture, or any part of the system as required.
11. During the development of the software component, a Developer will have the discretion to
share/ not share the source code with other developer. However, once the code is submitted
and accepted by the Authority, the Authority can make the source code available to with a view
to further enhancements/improvements or additions for any additional features.
All interested Developers may send their intentions to participate in this collaborative effort to
enrolmentsw@uidai.gov.in. They should send the details of the developers who will work on this project
and their brief resume and their proposal of work. They should also send their contact details (email and
phone numbers etc. so that they may be contacted if required.
UNIQUE INDENTIFICATION AUTHORITY OF INDIA
PLANNING COMMISSION
GOVERNMENT OF INDIA
3rd Floor, Tower-II, Jeevan Bharati Building,
Connaught Circus, New Delhi - 110 001
NOTICE INVITING APPLICATIONS
FOR HIRING OF BIOMETRICS CONSULTANT
(A-11016/07/10-UIDAI)
The Unique Identification Authority of India (UIDAI) invites applications
from experienced individual professional consultants working in the area
of Biometrics for assisting in proof of concept of Biometric solutions for
UIDAI project. The duration of consultancy assignment would be for six
months beginning March'2010.
For the details of qualifications and list of deliverables, applicant may
see www.uidai.gov.in with subject 'Hiring of Biometric Consultant' (under
Tenders section).
The applications with CV should reach the Deputy Director General , UIDAI, 3rd
Floor Tower-II Jeevan Bharati Building, New Delhi - 110001 and/or may be emailed
to ddguidai@gmail.com with subject 'Hiring of Biometric
consultant' on or before 23th February 2010.
All queries and clarifications should be addressed to: 'Deputy Director General,
UIDAI, 3rd Floor Tower-II Jeevan Bharati Building, Connaught Circus, New Delhi;
Tele/Fax: 011- 23752671,23753706.
Sd/-
B.B.Nanawati
Deputy Director General
UIDAI, New Delhi
Please visit http//uidai.gov.in for further details.
UNIQUE INDENTIFICATION AUTHORITY OF INDIA
PLANNING COMMISSION
GOVERNMENT OF INDIA
3rd Floor, Tower-II, Jeevan Bharati Building,
Connaught Circus, New Delhi - 110 001
F.No. A-11016/07/09-UIDAI
Hiring of Biometric Consultant for UIDAI
[For assisting in POC of Biometric Solutions]
Qualifications :Biometrics Consultant
· Doctorate in biometric technology from international university recognized for
outstanding biometric work
· Actively involved in research and must have authored numerous research
papers and books on biometric technology
· Hands on experience in biometric matching algorithm including original
contribution in the same
· 5+ years of experience as chief scientist or CTO in a biometric company or
equivalent role in the consulting company.
· Hands on experience in designing and evaluating different algorithms at
mathematical/internal level
Deliverables
1. Build biometric component of enrollment workstation software including
automated quality check and enhancement tools for PoC.
The success of the UID project depends on the accuracy of biometric deduplication
to ensure that one person can obtain only one UID number. The most
significant factor contributing to the accuracy of biometric de-duplication is the
quality of acquired biometric data. Many factors affect quality of biometric data.
The most important factor affecting quality of capture is capture process, quality
feedback, and quality of capture devices.
The capture process is a combination of logistics of biometric data acquisition,
ergonomic considerations (e.g., should the subject be standing or sitting etc.),
sequence of actions for the operator, sequence of actions for the subject, the ease
of use of the capture software, and type of quality feedback, capture sequence,
etc. The capture software should be intuitive, easy to use, and assist in capture
process in such a way as to maximize the quality of captured biometric data as
well as throughput.
UIDAI needs high quality design and implementation of capture software as well
as process that maximizes the quality of captured biometric data in the Indian
context. For the western world, NIST for instance has invested tens of man-years
of work to come up with recommendations for biometric capture process. See
http://zing.ncsl.nist.gov/biousa/. Studies conducted by NIST have included
usability of height and angles of ten-print fingerprint capture, types of
instructions provided to the subject, effect of scanner/table height on the
fingerprint capture, health and safety perception of biometric devices, effects of
habituation to biometric devices etc. UIDAI requires design and development of
capture software that is appropriate for the Indian context as well as a detailed
process flow that is adapted to rural India. Also, specific considerations need to
be made for the particular application of the UID in India.
The Consultant will generate a reference design and implementation of
biometric capture software and process be studied, developed, and delivered to
UIDAI in source code. The reference implementation will designed such that
biometric device from different vendors can be integrated easily.
2. Design biometric PoC to test key hypothesis (list hypothesis and importance of
hypothesis) and to use for benchmarking during pilot biometric vendor
selection.
There are two objectives of the UIDAI biometric PoC. The first objective is to
assess the biometric de-duplication accuracy that can be achieved in the Indian
context. NIST has spent considerable efforts over the past 10-15 years in
benchmarking the state-of-the-art extractor and matching technology for
fingerprint, face, and iris biometrics on the western population. See
http://fingerprint.nist.gov/, http://face.nist.gov/, and http://iris.nist.gov/.
While NIST documents the fact that the accuracy of biometric matching is
extremely dependent of demographics and environmental conditions, there is a
lack of a sound study that documents the accuracy achievable on Indian
demographics (i.e., larger percentage of rural population) and in Indian
environmental conditions (i.e., extremely hot and humid climates and facilities
without air-conditioning). In fact we could not find any credible study assessing
the achievable accuracy in any of the developing countries. UIDAI has
performed some preliminary assessment of quality of fingerprint data from
Indian rural demographics and environments and the results are encouraging.
The "quality" assessment of fingerprint data is not sufficient to fully understand
the achievable de-duplication accuracy. The next step is to acquire biometrics
data from the Indian rural conditions in two sessions (with a time difference)
and assess the matchability of the biometric data – each biometric (fingerprint
and iris) on its own as well as in a combination.
The second objective of PoC is to collect biometric data to be used in
benchmarking biometric de-duplication technology and software. Such a
benchmark will be critical in vendor selection. Biometric de-duplication
technology is a complex technology that requires several evaluation criteria to
be assessed simultaneously. For example, false positive identification rate (FPIR)
and false negative identification (FNIR) rate as well as the change in these error
rates as related to number of identities in the gallery. Further, the matching
speed is related to the error rates as well as number of identities in the gallery.
NIST has conducted a large number of vendor comparisons over the past two
decades. However there are two problems in using NIST evaluations for UIDAI.
Firstly, NIST has not conducted the evaluation with the UIDAI application in
mind, for example, NIST does not benchmark matching speed together with
matching accuracy. Secondly, the benchmarks are a snapshot in time while the
technology evolves over a period of time. As a result, many of the NIST
benchmarks can are outdated. And finally, NIST has not benchmarked fusion of
the biometrics relevant to UIDAI.
The Consultant will specify key hypothesis should be tested to understand the
achievable accuracy from biometrics on Indian demographics and conditions.
The Consultant will design PoC process to collect necessary data to test the
hypothesis. The design should be statistically valid and accurate to achieve
stated goals.
3. During PoC sample and monitor software and process to suggest improvements
in the process.
The UIDAI PoC will commence with biometric enrollment capture software as
specified/required above. As the PoC progresses in the field, the operation of
capture software and process will need to be monitored. Such monitoring is
required to fine tune the software and process to make it as efficient as possible.
Example may include a change in the sequence of biometric data capture, a
change in the physical setup of the capture stations, a change in the instructions
provided to subjects, or a fine tuning of parameters in the capture software may
result in a more efficient and more effective process. Efficiency in biometric data
capture can result in huge cost savings when the UIDAI program scales to a large
population. The capture software and process also needs monitoring to fine tune
the quality of biometric capture. It is well known that the quality of captured
biometric data is the most important factor contributing to the de-duplication
accuracy. The captured biometric data from the PoC is required to be monitored
to fine tune the software and process.
The Consultant will visit PoC fields sites, review the operation, make
observation, suggest improvement and provide final report stating level of
conformance with the designed plan. The Consultant will provide in writing
report on recommended changes for the remaining PoC process.
4. Design analytical models and process for calculating accuracy and performance
of different biometric traits as well as fusion of multiple traits from the PoC data.
Evaluation of biometric technology is a complex task not only due to the fact that
it needs to be evaluated on a number of parameters but also due to the fact that
the evaluation is statistical in nature. The results may not be repeatable if there
are even slight changes in any parameters. UIDAI requires design of analytical
framework to specify which types of tests are to be conducted and how to assess
if the test results are statistically significant. UIDAI requires design of
experiments to assess how to combine the biometrics used in the UIDAI
application (10 fingerprints, 2 iris, and face) to achieve the correct balance
among throughput, cost, and the matching accuracy. If not carefully assessed and
evaluated, UIDAI may procure software that is more expensive, requires a larger
data center, and yet not very accurate. This balance of accuracy and performance
is very delicate and UIDAI application specific.
The Consultant will provide detailed methodology and process for calculating
accuracy and performance for each biometric modality separately as well as
different applicable combination (fusion) of modalities for PoC.
5. Review biometric operational best practices document for urban and rural
environment including enrollment sequencing and monitoring to result in
highest quality of capture.
As mentioned above, UIDAI requires initial enrollment capture software and
process design and implementation for the PoC. Fine tuning of the software and
process will occur during the data capture of the PoC. After the PoC, the capture
software and process will need to be updated and generalized for the UIDAI
Pilot. This is due to the fact that post-PoC, the software and process will be
required to be more generic. For example, different process may be followed in
rural locations than in urban locations. Slightly different processes may be
required in different states. While process must be adapted to be more generic,
the process should still acquire the best possible biometric data. UIDAI requires
expert review of the operational best practices document for urban and rural
environment. This review will include the software used for biometric data
capture, devices used for the capture, as well as the process followed. The review
will be conducted through an examination of the biometric data collected from
the field.
The Consultant will review final PoC result documents for accuracy,
completeness and best practice recommendations. The Consultant will review
final software and provide written report on suggested enhancements for Pilot
phase.
6. Develop biometric technology requirements to be given to PMC for MSP tender
The PMC is responsible for writing tender to select Managed Service Provider.
The specific requirements for biometric enrollment, de-duplication and
authentication server need specialized knowledge of biometric algorithms,
image processing techniques and statistical tools. The requirements will also
cover integration of biometric solution with the remaining UID. This integration
must be done in a way to avoid vendor lock-in, utilize opens source technology
to the extent possible and support e-governance cloud architecture. Each
component of biometric solution should be modular and would allow for its
replacement without affecting remaining components. The requirements will
also include models for balancing accuracy against resource requirements
(H/W) and dynamically changing matching algorithm threshold as the database
size increases. Finally, the requirements must meet UID Biometric Standards and
other international standards. The Consultant will provide comprehensive
requirements to the PMC to be included in the MSP tender. The requirements
will include the design of the system as well as the biometric technology
requirements and judgment criteria.
7. Develop biometric de-duplication design for pilot and support integration needs
of the Pilot software development team.
The UIDAI technology team will develop UID Pilot software. The Pilot software
will integrate biometric de-duplication software from short listed biometric
solution vendor. UIDAI requires the design of biometric software into the Pilot
software such that multiple biometric vendor solution can be easily integrated
and operated in parallel. The overall design should be robust, general, scalable,
and avoid vendor/technology lock-in. It should be standards-based and qualityconscious.
The Consultant will generate a document containing the design of the biometric
component for the UIDAI Pilot as well as providing support for the integration of
biometric technology into the Pilot software. The integration may combine
different biometric technologies from different vendors. The integration design
must achieve the right balance among accuracy, speed, and cost of software and
computational resources (data center).
8. Design benchmarking requirements and benchmarking process for evaluating
vendor solution during Pilot
During the tender evaluation process (concurrent with Pilot), the specific
proposals of the biometric vendors will be required to be benchmarked and
evaluated. Such an evaluation will consider biometric de-duplication accuracy,
matching speed, and cost of the software and computational resources. UIDAI
needs requirements for vendor in terms of deliverables from the vendors. UIDAI
also needs requirements and process for evaluating the vendors on biometric
technology as well as integration. The benchmarking protocols must be
representative of the UIDAI application. For example, under the patriot act, NIST
performed many large benchmarks between 2002 and 2006 for the specific
application of border control in the US. See
http://www.itl.nist.gov/iad/894.03/pact/pact.html. Such efforts are required
for the specific application of UIDAI. The design of benchmarking and
benchmarking process for evaluating solution during vendor selection is
required by UIDAI to be performed diligently. The database during pilot will
remain small compared to the eventual target of 1.2B. The benchmarking may
consist of synthetically generating biometric samples or collecting data from
pre-existing databases of the various GoI departments and agencies. The
benchmarking will incorporate several variables: database size, accuracy,
resource requirements and performance. Therefore the benchmarking protocol
must be designed scientifically to meet UIDAI's goals.
The Consultant will in conjunction with UIDAI Pilot team will develop
benchmarking requirements and process for vendor evaluation.
9. Evaluate benchmarking results and provide comparative benchmark assessment
Once the benchmarking is performed as per the design that will result from the
point above, the results will be required to be analyzed and interpreted. As
mentioned before, biometric evaluations are multi-dimensional. And more
importantly the biometric evaluations are statistical. The statistical significance
of the test results are required to be analyzed for UIDAI.
The Consultant will develop framework for collecting benchmark results and
analyzing the final data. The Consultant will review the results and provide his
interpretation of the results. Finally, the Consultant will recommend the
biometrics solution based on the benchmarks.
UNIQUE INDENTIFICATION AUTHORITY OF INDIA
PLANNING COMMISSION
GOVERNMENT OF INDIA
3rd Floor, Tower-II, Jeevan Bharati Building,
Connaught Circus, New Delhi - 110 001
NOTICE INVITING APPLICATIONS
FOR HIRING OF BIOMETRICS CONSULTANT
(A-11016/07/10-UIDAI)
The Unique Identification Authority of India (UIDAI) invites applications
from experienced individual professional consultants working in the area
of Biometrics for assisting in proof of concept of Biometric solutions for
UIDAI project. The duration of consultancy assignment would be for six
months beginning March'2010.
For the details of qualifications and list of deliverables, applicant may
see www.uidai.gov.in with subject 'Hiring of Biometric Consultant' (under
Tenders section).
The applications with CV should reach the Deputy Director General , UIDAI, 3rd
Floor Tower-II Jeevan Bharati Building, New Delhi - 110001 and/or may be emailed
to ddguidai@gmail.com with subject 'Hiring of Biometric
consultant' on or before 23th February 2010.
All queries and clarifications should be addressed to: 'Deputy Director General,
UIDAI, 3rd Floor Tower-II Jeevan Bharati Building, Connaught Circus, New Delhi;
Tele/Fax: 011- 23752671,23753706.
Sd/-
B.B.Nanawati
Deputy Director General
UIDAI, New Delhi
Please visit http//uidai.gov.in for further details.
UNIQUE INDENTIFICATION AUTHORITY OF INDIA
PLANNING COMMISSION
GOVERNMENT OF INDIA
3rd Floor, Tower-II, Jeevan Bharati Building,
Connaught Circus, New Delhi - 110 001
F.No. A-11016/07/09-UIDAI
Hiring of Biometric Consultant for UIDAI
[For assisting in POC of Biometric Solutions]
Qualifications :Biometrics Consultant
· Doctorate in biometric technology from international university recognized for
outstanding biometric work
· Actively involved in research and must have authored numerous research
papers and books on biometric technology
· Hands on experience in biometric matching algorithm including original
contribution in the same
· 5+ years of experience as chief scientist or CTO in a biometric company or
equivalent role in the consulting company.
· Hands on experience in designing and evaluating different algorithms at
mathematical/internal level
Deliverables
1. Build biometric component of enrollment workstation software including
automated quality check and enhancement tools for PoC.
The success of the UID project depends on the accuracy of biometric deduplication
to ensure that one person can obtain only one UID number. The most
significant factor contributing to the accuracy of biometric de-duplication is the
quality of acquired biometric data. Many factors affect quality of biometric data.
The most important factor affecting quality of capture is capture process, quality
feedback, and quality of capture devices.
The capture process is a combination of logistics of biometric data acquisition,
ergonomic considerations (e.g., should the subject be standing or sitting etc.),
sequence of actions for the operator, sequence of actions for the subject, the ease
of use of the capture software, and type of quality feedback, capture sequence,
etc. The capture software should be intuitive, easy to use, and assist in capture
process in such a way as to maximize the quality of captured biometric data as
well as throughput.
UIDAI needs high quality design and implementation of capture software as well
as process that maximizes the quality of captured biometric data in the Indian
context. For the western world, NIST for instance has invested tens of man-years
of work to come up with recommendations for biometric capture process. See
http://zing.ncsl.nist.gov/biousa/. Studies conducted by NIST have included
usability of height and angles of ten-print fingerprint capture, types of
instructions provided to the subject, effect of scanner/table height on the
fingerprint capture, health and safety perception of biometric devices, effects of
habituation to biometric devices etc. UIDAI requires design and development of
capture software that is appropriate for the Indian context as well as a detailed
process flow that is adapted to rural India. Also, specific considerations need to
be made for the particular application of the UID in India.
The Consultant will generate a reference design and implementation of
biometric capture software and process be studied, developed, and delivered to
UIDAI in source code. The reference implementation will designed such that
biometric device from different vendors can be integrated easily.
2. Design biometric PoC to test key hypothesis (list hypothesis and importance of
hypothesis) and to use for benchmarking during pilot biometric vendor
selection.
There are two objectives of the UIDAI biometric PoC. The first objective is to
assess the biometric de-duplication accuracy that can be achieved in the Indian
context. NIST has spent considerable efforts over the past 10-15 years in
benchmarking the state-of-the-art extractor and matching technology for
fingerprint, face, and iris biometrics on the western population. See
http://fingerprint.nist.gov/, http://face.nist.gov/, and http://iris.nist.gov/.
While NIST documents the fact that the accuracy of biometric matching is
extremely dependent of demographics and environmental conditions, there is a
lack of a sound study that documents the accuracy achievable on Indian
demographics (i.e., larger percentage of rural population) and in Indian
environmental conditions (i.e., extremely hot and humid climates and facilities
without air-conditioning). In fact we could not find any credible study assessing
the achievable accuracy in any of the developing countries. UIDAI has
performed some preliminary assessment of quality of fingerprint data from
Indian rural demographics and environments and the results are encouraging.
The "quality" assessment of fingerprint data is not sufficient to fully understand
the achievable de-duplication accuracy. The next step is to acquire biometrics
data from the Indian rural conditions in two sessions (with a time difference)
and assess the matchability of the biometric data – each biometric (fingerprint
and iris) on its own as well as in a combination.
The second objective of PoC is to collect biometric data to be used in
benchmarking biometric de-duplication technology and software. Such a
benchmark will be critical in vendor selection. Biometric de-duplication
technology is a complex technology that requires several evaluation criteria to
be assessed simultaneously. For example, false positive identification rate (FPIR)
and false negative identification (FNIR) rate as well as the change in these error
rates as related to number of identities in the gallery. Further, the matching
speed is related to the error rates as well as number of identities in the gallery.
NIST has conducted a large number of vendor comparisons over the past two
decades. However there are two problems in using NIST evaluations for UIDAI.
Firstly, NIST has not conducted the evaluation with the UIDAI application in
mind, for example, NIST does not benchmark matching speed together with
matching accuracy. Secondly, the benchmarks are a snapshot in time while the
technology evolves over a period of time. As a result, many of the NIST
benchmarks can are outdated. And finally, NIST has not benchmarked fusion of
the biometrics relevant to UIDAI.
The Consultant will specify key hypothesis should be tested to understand the
achievable accuracy from biometrics on Indian demographics and conditions.
The Consultant will design PoC process to collect necessary data to test the
hypothesis. The design should be statistically valid and accurate to achieve
stated goals.
3. During PoC sample and monitor software and process to suggest improvements
in the process.
The UIDAI PoC will commence with biometric enrollment capture software as
specified/required above. As the PoC progresses in the field, the operation of
capture software and process will need to be monitored. Such monitoring is
required to fine tune the software and process to make it as efficient as possible.
Example may include a change in the sequence of biometric data capture, a
change in the physical setup of the capture stations, a change in the instructions
provided to subjects, or a fine tuning of parameters in the capture software may
result in a more efficient and more effective process. Efficiency in biometric data
capture can result in huge cost savings when the UIDAI program scales to a large
population. The capture software and process also needs monitoring to fine tune
the quality of biometric capture. It is well known that the quality of captured
biometric data is the most important factor contributing to the de-duplication
accuracy. The captured biometric data from the PoC is required to be monitored
to fine tune the software and process.
The Consultant will visit PoC fields sites, review the operation, make
observation, suggest improvement and provide final report stating level of
conformance with the designed plan. The Consultant will provide in writing
report on recommended changes for the remaining PoC process.
4. Design analytical models and process for calculating accuracy and performance
of different biometric traits as well as fusion of multiple traits from the PoC data.
Evaluation of biometric technology is a complex task not only due to the fact that
it needs to be evaluated on a number of parameters but also due to the fact that
the evaluation is statistical in nature. The results may not be repeatable if there
are even slight changes in any parameters. UIDAI requires design of analytical
framework to specify which types of tests are to be conducted and how to assess
if the test results are statistically significant. UIDAI requires design of
experiments to assess how to combine the biometrics used in the UIDAI
application (10 fingerprints, 2 iris, and face) to achieve the correct balance
among throughput, cost, and the matching accuracy. If not carefully assessed and
evaluated, UIDAI may procure software that is more expensive, requires a larger
data center, and yet not very accurate. This balance of accuracy and performance
is very delicate and UIDAI application specific.
The Consultant will provide detailed methodology and process for calculating
accuracy and performance for each biometric modality separately as well as
different applicable combination (fusion) of modalities for PoC.
5. Review biometric operational best practices document for urban and rural
environment including enrollment sequencing and monitoring to result in
highest quality of capture.
As mentioned above, UIDAI requires initial enrollment capture software and
process design and implementation for the PoC. Fine tuning of the software and
process will occur during the data capture of the PoC. After the PoC, the capture
software and process will need to be updated and generalized for the UIDAI
Pilot. This is due to the fact that post-PoC, the software and process will be
required to be more generic. For example, different process may be followed in
rural locations than in urban locations. Slightly different processes may be
required in different states. While process must be adapted to be more generic,
the process should still acquire the best possible biometric data. UIDAI requires
expert review of the operational best practices document for urban and rural
environment. This review will include the software used for biometric data
capture, devices used for the capture, as well as the process followed. The review
will be conducted through an examination of the biometric data collected from
the field.
The Consultant will review final PoC result documents for accuracy,
completeness and best practice recommendations. The Consultant will review
final software and provide written report on suggested enhancements for Pilot
phase.
6. Develop biometric technology requirements to be given to PMC for MSP tender
The PMC is responsible for writing tender to select Managed Service Provider.
The specific requirements for biometric enrollment, de-duplication and
authentication server need specialized knowledge of biometric algorithms,
image processing techniques and statistical tools. The requirements will also
cover integration of biometric solution with the remaining UID. This integration
must be done in a way to avoid vendor lock-in, utilize opens source technology
to the extent possible and support e-governance cloud architecture. Each
component of biometric solution should be modular and would allow for its
replacement without affecting remaining components. The requirements will
also include models for balancing accuracy against resource requirements
(H/W) and dynamically changing matching algorithm threshold as the database
size increases. Finally, the requirements must meet UID Biometric Standards and
other international standards. The Consultant will provide comprehensive
requirements to the PMC to be included in the MSP tender. The requirements
will include the design of the system as well as the biometric technology
requirements and judgment criteria.
7. Develop biometric de-duplication design for pilot and support integration needs
of the Pilot software development team.
The UIDAI technology team will develop UID Pilot software. The Pilot software
will integrate biometric de-duplication software from short listed biometric
solution vendor. UIDAI requires the design of biometric software into the Pilot
software such that multiple biometric vendor solution can be easily integrated
and operated in parallel. The overall design should be robust, general, scalable,
and avoid vendor/technology lock-in. It should be standards-based and qualityconscious.
The Consultant will generate a document containing the design of the biometric
component for the UIDAI Pilot as well as providing support for the integration of
biometric technology into the Pilot software. The integration may combine
different biometric technologies from different vendors. The integration design
must achieve the right balance among accuracy, speed, and cost of software and
computational resources (data center).
8. Design benchmarking requirements and benchmarking process for evaluating
vendor solution during Pilot
During the tender evaluation process (concurrent with Pilot), the specific
proposals of the biometric vendors will be required to be benchmarked and
evaluated. Such an evaluation will consider biometric de-duplication accuracy,
matching speed, and cost of the software and computational resources. UIDAI
needs requirements for vendor in terms of deliverables from the vendors. UIDAI
also needs requirements and process for evaluating the vendors on biometric
technology as well as integration. The benchmarking protocols must be
representative of the UIDAI application. For example, under the patriot act, NIST
performed many large benchmarks between 2002 and 2006 for the specific
application of border control in the US. See
http://www.itl.nist.gov/iad/894.03/pact/pact.html. Such efforts are required
for the specific application of UIDAI. The design of benchmarking and
benchmarking process for evaluating solution during vendor selection is
required by UIDAI to be performed diligently. The database during pilot will
remain small compared to the eventual target of 1.2B. The benchmarking may
consist of synthetically generating biometric samples or collecting data from
pre-existing databases of the various GoI departments and agencies. The
benchmarking will incorporate several variables: database size, accuracy,
resource requirements and performance. Therefore the benchmarking protocol
must be designed scientifically to meet UIDAI's goals.
The Consultant will in conjunction with UIDAI Pilot team will develop
benchmarking requirements and process for vendor evaluation.
9. Evaluate benchmarking results and provide comparative benchmark assessment
Once the benchmarking is performed as per the design that will result from the
point above, the results will be required to be analyzed and interpreted. As
mentioned before, biometric evaluations are multi-dimensional. And more
importantly the biometric evaluations are statistical. The statistical significance
of the test results are required to be analyzed for UIDAI.
The Consultant will develop framework for collecting benchmark results and
analyzing the final data. The Consultant will review the results and provide his
interpretation of the results. Finally, the Consultant will recommend the
biometrics solution based on the benchmarks.
Giving Indians an identity
This pro-technology mindset that cuts across income groups and communities may seem curious in a developing country such as ours. One cause for our positive attitude may be the unique role that information and communication technology (ICT) has played in India. For us, technology has been a source of reform and empowerment, a way out of entrenched, difficult-to-navigate institutions . This has held true since 1984, when a reformist Indian government, led by the youngest prime minister in Indian history, turned to technology to implement its propoor agenda. Rajiv Gandhi railed against "the brokers of power and influence" that dominated India's economic institutions, and saw technology as a way to loosen their hold.
What followed, among other initiatives, was the public call office model, implemented by Sam Pitroda , which transformed access to telecom in the mid-1980 s, and established technology in a now familiar role - as a means of enabling greater access to resources and services at lower costs.
WONDER OF ELECTRONIFICATION
The most noticeable impact of electronification has been in expanding the circles of access within the economy. The transition that technology has helped enable in India fits into economist Douglass North's description of the shift of a limited access economy - where access to resources is controlled by a small group of elites - to an open access model, where resources and skills are widely attainable.
The economic structure until the 1980s in India was a restrictive one, where government and an oligopolistic market controlled much of the resources through a licensing system, state-dominated production and centralised institutions. Entry costs into the economy were high - access to resources such as finance, subsidies and business licenses were restricted to those who had patronage networks. Access depended on 'who one was, and who one knew' .
Technology has played a crucial role alongside reforms since then, in expanding circles of access. It has enabled India to move from markets where access to resources and institutions was limited - such as stock markets where trading was controlled by brokers, and agricultural supply chains where crop prices were determined by middlemen - to democratised, open access systems that have empowered individuals. Electronic stock markets have allowed individuals to execute their trading orders from anywhere in the country, and widespread access to mobile phones has meant farmers can call up mandis to negotiate prices.
The impact of technology on our institutions and markets has been most apparent in the way it has helped disseminate economic power, by bringing information to poor and rural communities. Information asymmetries are quickly vanishing - one NGO worker recently described how at a village self-help group meeting, a farmer checked an SMS on his mobile phone and told the meeting that a Bollywood superstar had taken ill - information he received at the same time it was being broadcast by news channels . The impact of such instant information access cannot be underestimated: by connecting more people to information and knowledge sources, we are creating a cycle of innovation and productivity.
THE CHALLENGE OF IDENTITY
One piece of technology is turbo-charging electronification in India - the mobile phone. It has dramatically brought down the costs of plugging into the information network. As device costs continue to fall, we can envision the possibility of a smart phone in every village in the next decade, and in the hands of every Indian in the next fifteen years. We can expect that in less than this time, connectivity will be pervasive. In the near future, we will have unprecedented, universally accessible computing power, which can tap into information flows across a ubiquitous network.
We have to build the tools to take advantage of this emerging reality. Even though ICT infrastructure has expanded rapidly over the last decade, we are yet to leverage it fully. The impact of telecom access in India for example, has remained limited to the access and delivery of information. Using the mobile phone for transaction and delivery of services such as banking has remained largely untapped.
A challenge we face in such service delivery is tackling risks that have emerged with open access systems. In economies with limited access, transactions depend on organised relationships, face-to-face interaction, identity verification and patronage networks . Anonymity is low, and systemic trust - a prerequisite for transactions - is easier to enforce.
Open access systems, however, come with greater anonymity. Service providers can't automatically trust individuals, since they have no history of business with them, and poor customers also often lack identity documentation. Remote transactions complicate these challenges further. Consequently, service providers now spend large amounts of money on KYC - know your customer - processes to ensure that the transaction with the customer is a safe one.
POSSIBILITIES OF UID
The UID number, with its 'anytime, anywhere' biometric authentication, addresses the problem of trust within a transaction for both face-to-face and remote service delivery. Making identity easy to verify brings down the risks associated with enabling open access systems. The UID's online verification can also make geographical distances irrelevant to delivery of services. The ability of individuals to prove their identity anywhere in the country becomes valuable as migration and urbanisation intensify.
The UID allows agencies across a variety of sectors , such as banking and finance, to provide remote services. Removing the need for multiple verification processes reduces costs for service providers. Additionally , replacing brick and mortar infrastructure with low-cost technology applications will lower transaction costs even further. By facilitating such remote, easy verification of identity, the UID number becomes the glue for service providers to bring together existing technologies and create end-to-end , low-cost , electronified models, where individuals can transact with micro amounts - as small as Rs 10 - equipped with little more than a mobile phone.
Such a low-cost , accessible model would be inclusive , bringing millions into India's burgeoning economy. As the UID network becomes ubiquitous, the applications on top of it will increase, expanding into a variety of services.
The UID opens up a vast array of new possibilities for our technological future, and offers a foundation on which a host of applications can be built. For example , the UID number of each resident can be linked to a bank account through which the government can provide direct services, such as health and education, through digital vouchers and cash benefits . Such service delivery also enables governments to establish relationships directly with individuals, rather than interest groups. The increased negotiating power this enables for individuals will mean fairer , more transparent public delivery systems and stronger, more enforceable rights.
The implementation of UID comes even as demand for electronification in India is increasing. Until the 1980s, the infrastructure focus of Indian governments used to be on providing basic necessities - roti, kapda aur makan (food, clothes and house). Since reforms in the 1990s, the emphasis moved to broader, community infrastructure - bijli , sadak, pani (electricity, roads, water). Today, people's aspirations have shifted to 'mobile, bank account, UID' . The demand is for infrastructure that empowers the individual, and provides economic opportunity.
The UID is soft infrastructure, much like mobile telephony, internet connectivity and financial access, important to connect individuals to the broader economy, and critical for people to leverage opportunity and access.
IMPLICATIONS OF ACCESS
The impact of the falling transaction and entry costs that accompany electronification and UID has long-term implications for our growth. Economies become more efficient as transaction and entry costs move towards zero. These falling costs are important drivers for development and equitable growth thanks to the higher impact of every rupee spent in the economy. Additionally, lowering these costs means greater inclusion as more people can afford to participate in our markets and institutions.
Such inclusion will intensify competition, motivating us towards innovation and new ideas. The 'platform' nature of UID - where its identity systems enable a variety of applications - can become a potent source of empowerment for the individual, as individuals, businesses and governments build applications suited to local needs and innovation.
I believe that we are now at a transformational moment, where the immense potential of these technologies is becoming clear. Aided by technology , we are moving from an economy that constrains access to goods and services, to one where access is democratised, open and inclusive.
India may be uniquely destined to leverage technology in a multitude of ways. Electronification triggered enormous changes in the US and Europe - countries that saw these technologies emerge late in their development - and intersected with their development arc at a time when traditional infrastructure and business models were well entrenched.
In India, the arc of technology is intersecting with the developmental arc at an early stage. India is not yet a 'settled in' economy: Our market systems are a little more than a quarter of a century old, and our infrastructure and supply chains are yet to be established. We have the opportunity to leverage technology far more ambitiously and intensively , and build truly inclusive, transformational infrastructure and institutions. Electronification can play a big part in determining the kind of society we are going to be over the next decade.
|
|
Top Stories
Fear grips Bharati Vidyapeeth studentsTimes of India - - 1 hour ago PUNE: Grief over Aditya Mehta's death and a sense of fear was palpable among students on the Bharti Vidaypeeth campus on Wednesday. Pune death toll goes up to 11 The Hindu Blast toll 11 as football fan dies Asian Age Indian Express - IBNLive.com - NDTV.com - Calcutta Telegraph - Wikipedia: 2010 Pune bombing Email this story India to Pakistan: No composite dialogueThe Hindu - - 4 hours ago NEW DELHI: Ruling out a composite dialogue in the near future, India on Wednesday told Pakistan that the coming meeting of the Foreign Secretaries could discuss all subjects but New Delhi will focus only on terror. India, Pak argue on scope of talks Times of India Economic Times - Daily News & Analysis - Indian Express - Daily Times Email this story Tussle at top over Silda naxal attackTimes of India - 3 hours ago KOLKATA: A tussle has broken out at the very top over Monday's Maoist attack at the Silda camp. Home secretary Ardhendu Sen and director-general of police Bhupinder Singh are having serious differences of opinion over probing what led to the daring ... Bengal cops slept over intelligence reports on Maoists Economic Times | |
No comments:
Post a Comment