Of fuzzy logic and fusion engines

1 October 2014 Access Control & Identity Management

The twenty-first century has thrown up entirely new paradigms of crime and terror in scale as well as in remoteness and anonymity from which the new criminal can strike and unleash untold violence on unsuspecting citizens – at schools, malls, offices, crowded public places and even homes. To compound the situation, the police and security agencies often do not have the luxury of well-defined space in which to search and indefinite time in which to arrive at deductions.

Sanjay Dharwadker
Sanjay Dharwadker

Often, the masterminds of unspeakable horror could just lurk in cyberspace, or appear and disappear at places so ephemerally and in such deceiving ways that conventional techniques, such as biometrics when used in isolation, could be effective only by remote chance.

In such a situation, we seem to have arrived into the future where a new generation of devices and techniques are being deployed in an integrated and comprehensive manner, that are yielding spectacular results already.

One of the key elements of such strategies is the effective use of multi-modal biometric search engines. It is well known by now that no single biometric when used in isolation is effective any more. Fingerprint repositories, the legacy of colonial times, assume repeat crimes by the same individuals. This is well understood today, even by common thieves and thus routinely circumvented. DNA evidence can be planted and is often found to be so. Faces and voices can be camouflaged, but taken together with other evidence can be effective, and similarly so with samples of handwriting and signatures. Match this with a vehicle or house and street and the picture seems to gather focus, both in space and time.

Thus, such systems need to be able to process together, not only various kinds of biometrics, but also text, numbers and images from structured databases, geographical information systems or even disparate, unstructured or incompatible masses of data. In such situations the search and match processes are neither precise nor binary, but fuzzy – best described as being imprinted upon layers of information in shades of grey – arriving at degrees of recognition just like a human mind does; putting together shape, sound, smell, image and taste as well as their synthesia in different contexts.

In recent years, this has been made possible as four distinct elements of information technology have been fused together – large data storage, algorithms that can rapidly traverse and find, analytical tools that can join the dots, and finally field devices that can reveal the possibilities, instantaneously at the scene of action.

Such state-of-the-art systems for the search and match of identities are already in place, not only within criminal justice departments, but also border control for both passengers and cargo – where often quick reflexes have become the order of the day, in order to prevent deliberate planned acts of crime and violence.

Bombings in crowded places, like the London Subway and the Boston Marathon were successfully investigated by rapidly analysing terabytes of CCTV footage, zeroing down to a few single faces, and then tying this into other elements of bio-data. Mysteries such as the MH370 would be one day explained when the dots are finally joined, perhaps in this way.

Individually, many such algorithms and tools are known to be effective, but what is it that makes them successfully work together? While there can be many attributes to this, the single most important cornerstone seems to be the standards – that seem to have pervaded the systems and processes that are now expected to seamlessly work together for identity search and match, the most critical of these being BioAPI, CBEFF, PIV, ANSI INCITS 378 and 381 as well as ISO 19794 parts 4 and 5 – to name a few.

Another critical aspect is the global arena within which such systems are expected to successfully operate and thus must not only conform to prevailing multi-lateral frameworks, but also national and international law pertaining to customs and immigration. For this, such systems must be versatile and flexible and thus be able to fit into existing situations.

Also importantly, as Moore’s law goes, such systems are becoming increasingly cost-effective and can be afforded by a large number of governments and agencies, and could even be oriented into regions such as the SADC and can be jointly owned and operated by groups of nations having common interests. An important factor would be the training of personnel to manage, operate, maintain and thus ensure the overall sustainability of such systems in the long run, and of course become an important focus area of future multilateral cooperation.

So it seems that the post-modern Sherlock Holmes would do well to have identity search and match capabilities in his Watson – that can do fuzzy logic and of course, fusion engines – all in one.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.