- Department of Public Safety and Correctional Services

advertisement
ATTACHMENT H
State of Maryland
DPSCS/ITCD
Maryland Automated Fingerprint Identification System (MAFIS)
Functional and Technical Requirements Document
Final Document
Version 2.0
Prepared by:
Date Prepared: January 23, 2006
Functional Requirements Document (Final)
Version 2.0
Document Revision History
Version No.
Date
Revised By
Summary of Revision
1.0
12-12-05
Bob Bower
Created document template
1.0
12-16-05
William King
Initial write up for FRD document.
1.0
12-20-05
William King
Updates and details from requirements matrix updates.
1.1
01-03-06
William King
Updates based on stakeholder feedback
1.1
01-06-06
William King
Updates for draft #2 requirements categories.
1.1
01-11-06
Bob Bower
Updates based on stakeholder feedback
1.2
01-13-06
Bob Bower
Submitted to State as Version 1.2
2.0
01-23-06
Steve Turner
Submitted to State as Version 2.0
Nortel Government Solutions Incorporated
i
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
Table of Contents
1
GENERAL .......................................................................................................................................... 3
1.1
2
3
Project Description ............................................................................................................. 3
1.1.1
Background ......................................................................................................................... 3
1.1.2
Purpose................................................................................................................................ 5
FUNCTIONAL REQUIREMENTS ................................................................................................. 6
2.1
Data Requirements .............................................................................................................. 6
2.2
Functional and Technical Requirements ............................................................................. 6
2.2.1
General AFIS Requirements ............................................................................................... 6
2.2.2
Tenprint Processing Requirements ................................................................................... 10
2.2.3
Latent Processing Requirements ....................................................................................... 13
2.2.4
Latent Palm Processing Requirements.............................................................................. 16
2.2.5
Transaction Controller Processing Requirements ............................................................. 17
2.2.6
Fingerprint Archive Processing Requirements ................................................................. 19
2.2.7
AFIS Inked Card Conversion Requirements .................................................................... 22
2.2.8
Fast Identification ............................................................................................................. 23
2.2.9
Mugshot System ............................................................................................................... 24
2.2.10
System Management and Reporting ................................................................................ 27
OPERATIONAL REQUIREMENTS ............................................................................................ 34
3.1
Security ............................................................................................................................. 34
3.2
Audit Trail......................................................................................................................... 36
3.3
Networking ....................................................................................................................... 36
3.4
Data Currency ................................................................................................................... 36
3.5
Reliability.......................................................................................................................... 37
3.6
System Availability........................................................................................................... 37
3.7
Fault Tolerance ................................................................................................................. 37
3.8
Disaster Recovery ............................................................................................................. 39
3.9
Performance ...................................................................................................................... 40
3.10
Data Retention .................................................................................................................. 41
3.11
Project Management and Development ............................................................................ 41
4
REQUIREMENTS TRACE ABILITY MATRIX......................................................................... 46
5
Glossary ............................................................................................................................................. 46
Nortel Government Solutions Incorporated
ii
January 23, 2006
Functional Requirements Document (Final)
1
1.1
Version 2.0
GENERAL
Project Description
The scope of the MAFIS replacement will include the replacement of the following components
of the current MAFIS System:

Automated Fingerprint Identification System

Fingerprint Data Router (FDR)

Gateway Service Provider (GSP)

Fingerprint Archive
In addition, the following components will be added to the Maryland AFIS Replacement:

Optional Mugshot System

Fast ID capability (including two pilot locations)

Offsite Fail over systems with replicated data.
Within new technology AFIS systems, in order to provide complete and accurate results, all hard
copy inked tenprint cards will be converted into Maryland National Institute of Standards and
Technology (NIST) electronic tenprint records prior to AFIS processing. This will allow for the
inclusion of all fourteen images into MAFIS, ultimately improving the accuracy of latent
processing. In addition, the cards will be digitized at 1000ppi (as opposed to 500 ppi in the old
MAFIS), thus improving system quality and accuracy.
Card conversion will also be performed to support the new Fingerprint Archive. It is preferred
that all cards for each State Identification Number on record be converted. The State will have
the option to reduce the amount of converted records for the Archive based on cost. The card
conversion process for the Archive system, at a minimum standard will be the front scan
(fingerprint images) of the card at 1000ppi and back scan (demographic information) of each
arrest card at 500ppi.
The MAFIS replacement project will impact other Maryland applications currently in production.
DPSCS wants an independent “Transaction Controller” that will replace the current duties of the
FDR and GSP. This Transaction Controller will have to be designed and developed to be
compatible with internal and external applications. Coupled with the MAFIS and Transaction
Controller, necessary modifications of the surrounding legacy systems to support the modified
workflow will be necessary. Current applications such as IPS/CCH, RAS and ABS will need to
be modified to adhere to the Maryland NIST standards and a more streamlined workflow.
1.1.1
Background
The Maryland DPSCS has the primary responsibility for controlling, supervising, and providing
services for defendants and offenders in our custody. In addition, DPSCS creates statewide
correctional and rehabilitative initiatives, and criminal justice training standards that are the
foundation of Maryland’s crime control efforts. The department also manages statewide criminal
justice information and technology systems. These networks provide criminal justice agencies
and the courts with timely access to complete and accurate information about individuals under
their supervision. An ever-growing demand for civil background checks to protect our State’s
citizens is also supported by DPSCS.
Legislative changes in this area have driven the need for system flexibility.
information regarding DPSCS is available at www.dpscs.state.md.us.
Nortel Government Solutions Incorporated
3
Additional
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
In 1976, the Criminal Justice Information System (CJIS) was created and the CJIS Central
Repository was established effective December 31, 1977, to operate it. CJIS Central Repository
has evolved to be a direct service-provider to both the criminal justice community as well as the
non-criminal justice community. Technological services are provided by the IT units of the
Information Technology and Communications Division (ITCD). Designated by the Federal
Bureau of Investigation (FBI) as Maryland’s official State Identification Bureau, the CJIS Central
Repository receives, maintains, and disseminates Maryland’s criminal history records, which are
fingerprint-supported for positive identification. It receives reports of criminal “events” from the
police, courts, correctional agencies, and other criminal justice entities. These are compiled into
chronological history of an individual’s arrests, convictions, prosecution, etc., to form the “RAP”
(“Report of Arrest and Prosecution”) sheet.
Offender-based records are used by criminal and non-criminal justice agencies (police, sheriffs,
State’s attorneys, courts, correctional agencies, parole and probation, etc.) for investigation,
apprehension, prosecution, corrections, classification, and other criminal justice purposes. CJIS
Central Repository provided over 350,000 criminal history records checks to criminal justice
agencies, as well as, non criminal justice agencies in calendar year 2004, an increase of over 41%
in the past 9 years.
This project supports the following DPSCS goals developed in the Managing for Results (MFR)
process:

Safe Communities: Help to keep Maryland Communities safe by allowing quicker
retrieval and identification of offenders.

Good Management: Ensure that the Department operates efficiently by maintaining
an availability rate of 99.99%.
This project also supports the following overarching State enterprise business goals:

Focus on Customer Service by providing faster and more reliable identification of
offenders, as well as providing timely responses to non criminal justice agencies
mandated by homeland security issues to obtain Criminal History Record
Information (CHRI) for the purpose of risk assessments.

Improve Service Delivery Mechanisms to respond to the needs of a growing,
diverse population. This project will meet this goal by providing a more robust
fingerprint archive retrieval system for supplying information to Maryland’s growing
user population. Improved accuracy and timeliness with new functionality to include
Fast Identification processing.

Balance Freedom of information with privacy and security. The software will be
National Institute of Standards and Technology (NIST) standards compliant and
maintain the integrity of our data.

Improve the quality of information and decision-making. The capability of
capturing palm prints, scars marks and tattoos will improve the capability of a
positive match on an offender.
Nortel Government Solutions Incorporated
4
January 23, 2006
Functional Requirements Document (Final)
1.1.2
Version 2.0
Purpose
The current Automated Fingerprint Identification System will be replaced with a new MAFIS.
The new system will capture, store, index, and perform searches and matches on the fingerprints
of individuals for criminal justice and non-criminal justice purposes. Fingerprint Identification
will be performed on, but not limited to, criminal identification for adults, juveniles, and civil
background checks. The new system will have full disaster recovery capability.
This new system will permit faster identification and, will require less human intervention in the
processing of fingerprints through improved workflow and automated quality control capabilities.
It will also process palm prints and plain impressions or “flat” prints, in addition to the rolled
print capability of the current system.
More specifically, replacing the current MAFIS with the new MAFIS will provide the following
features:

Improved matching accuracy.

Faster identification processing.

Improved automated quality assurance checks that reduce human interaction.

Latent palm print matching.

No single point of failure in support of high availability.

Compliance with the DPSCS Disaster Recovery Plan.

Improved return on investment through reduced vendor dependence.

Provide a statistical reporting system for internal and external decision makers.

System must be capable of performing in a “lights-out” environment when possible
in order to minimize manual/human intervention and associated labor costs.

Flexible configuration that allows for future growth.

As an option, purchase a statewide Photo-Mugshot Photo System that will be
integrated with the MAFIS system.
Replacing the existing MAFIS with the purchase of a Commercial off the Shelf (COTS) package
will allow the State to meet the needs of the Homeland Security and FBI National Fingerprint File
(NFF) initiatives in a more timely fashion and keep MAFIS compliant with State and Federal
Regulations for personal identification through fingerprint technology. The project will
incorporate several technologies to include: distributed computing, TCP/IP communications
protocol, latent palm matching, electronic image capture, and software matching and relational
database software. The new MAFIS will be fully interoperable with other AFIS technology
worldwide and based on Maryland NIST. Any applications or peripheral devices that follow
NIST standards will be able to communicate with the MAFIS replacement system. As an option
to this project, a mug-photo identification system will be incorporated at the state level. A pilot
project will be planned for the use of FAST ID functionality.
This capability will allow departments and agencies to use a single finger scanner to capture flat
impressions and launch an automated search on the MAFIS system, returning responses to the
operator in a timely manner.
Nortel Government Solutions Incorporated
5
January 23, 2006
Functional Requirements Document (Final)
2
Version 2.0
FUNCTIONAL REQUIREMENTS
The functional requirements describe the core functionality of the application. This section
includes the data and functional process requirements.
2.1
Data Requirements
With the exception of the Transaction Controller, the AFIS Replacement System will be
comprised of several software components (AFIS, Archive, Fast ID, and Mugshot Photo systems)
that will be COTS products. The logical data model for these products will be dependent on the
Vendor and will not be a custom data model for Maryland. However, Maryland DPSCS will
require that certain fields be available within the database and that certain indexes are available
for searching and relating records between systems. These specifics will be discussed and
documented throughout the design phase of the project.
In addition to a system’s own unique identification or primary key, each software component at a
minimum needs to relate its records back to the SID, PCN, and/or tracking number for each
record it is processing. There are also inquiry functions that will require other key fields to be
available in all databases. The systems shall provide the ability to request a record through
primary and secondary search elements. The primary search elements include, but are not limited
to SID number, PCN, name, date of arrest, SSN, Originating Agency Case number and/or
Tracking number. Secondary search elements include but are not limited to, race, gender, record
type and transaction type.
2.2
2.2.1
Functional and Technical Requirements
General AFIS Requirements
A.1
The system must support the acquisition and storage of both 500ppi and 1000ppi images
for both tenprint and latent prints, including palmprints. Currently 500ppi Livescans
support electronic submissions. Over time, these will be upgraded to 1000ppi.
A.2
The proposed monitors at all AFIS workstations shall display images in at least 256
shades of gray at 1,000 ppi resolution.
A.3
System components and peripherals shall be the most current generation in commercial
use at the point of customer factory acceptance.
A.4
The hardware for the system shall be compatible with the State’s computing
environment, including databases and operating systems. State approval of all proposed
hardware and system software will be required.
A.5
All system processors shall be open systems compliant and shall maximize use of
commercial off-the-shelf hardware as well as operating system and applications software
packages.
A.6
The proposed servers and workstations must support multiple processors as needed for
purposes of expandability.
Nortel Government Solutions Incorporated
6
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
A.7
The System must use an ODBC or JDBC-compliant relational management database
system, preferably a RDBMS from Oracle, IBM DB2 or Microsoft SQL Server. The
database must be compliant with the State's SAN.
A.8
The system will use the State’s SAN for primary record storage.
A.9
The vendor shall provide design documentation for all system components as built, at the
completion of the design phase.
A.10
The vendor shall provide user manuals for all system components as built at the time of
factory acceptance. All documentation must be approved by the State. Any updates
identified during user acceptance will be incorporated prior to final acceptance.
A.11
The vendor shall provide maintenance, operations manuals, and all software release notes
for all system components as built, at the completion of the factory acceptance testing.
All documentation must be approved by the State. Any updates identified during user
acceptance will be incorporated prior to final acceptance.
A.12
The vendor shall provide time synchronization services for all AFIS subsystems plus the
Transaction Controller, Archive Server, and optional Photo-Mugshot Server using either
the AFIS or the Transaction Controller as the time server.
A.13
Each component within the system must be protected with anti-virus and appropriate
security related software. (State will provide the software and license to support this
requirement.).
A.14
The system shall guarantee delivery of a response within 3 seconds to any transaction that
has been accepted or rejected, unless deleted by a System Administrator.
A.15
The tenprint matching system shall be able to process tenprint images that are rotated as
much as 15 degrees in either direction from vertical alignment. This is a total of 30
degrees of potential rotation.
A.16
The system shall provide a notification to the CJIS supervisor (who will be a system
administrator) for records that are not meeting the Service Level Agreement for
processing time.
A.17
The System shall be designed to store all work-in-progress records if network or system
interruption occurs. Upon system restoration, all queued records will be automatically
forwarded without manual intervention. (This requirement is for system availability only
and does not relate to catastrophic events.)
A.19
The proposed system must already be successfully established and in production in
another location of similar size and complexity.
A.20
The delivered system shall have a useful lifespan of at least ten years from the date of
acceptance by State. Software and Hardware must be maintained at supported levels
throughout the life of the contract. (Cost for this requirement must be incorporated into
the annual maintenance fees and should not be a part of this procurement).
A.21
Vendor must provide a complete and separate test system that will mirror the production
system. This system will be used for training and for testing software updates before
Nortel Government Solutions Incorporated
7
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
implementation on the production system. At no time shall the test system impact the
production environment. (i.e. reboots).
A.22
The system shall support FAST ID capabilities and should provide encrypted data
communications to a browser based user interface for desktop and mobile devices.
A.23
Business workflows shall have the ability to be modified by the State via the Transaction
Controller, without the need for AFIS vendor intervention to the AFIS.
A.24
The systems shall provide responses back to end users via the Transaction Controller to
indicate the need for reprints due to poor quality of images, State identification results,
and FBI responses. These responses must be sent within 3 seconds of quality
verification.
A.25
The Transaction Controller and the AFIS Systems shall never allow duplicate PCN’s. A
high priority error message will be generated and sent back to the submitting agency via
the TC within 3 seconds upon identification of any duplicates.
A.26
The proposed printers shall have the ""(Autoselect) Select from dual-tray printer" (8 x 8
fingerprint card stock and letter size paper) option. Capacities must support a minimum
of 500 sheets of fingerprint card cardstock and 250 sheets of 8.5 X 11 paper.
A.27
The proposed printers shall have the ability to print all FBI fingerprint and palm print
templates, accurately reproducing gridlines and text on blank card stock.
A.28
The proposed printers shall have duplex capability that will not jam with FBI provided
blank card stock. Jams that occur more frequently than one per 2,500 cards will not be
allowed.
A.29
The proposed printers must support at a minimum 100mb Ethernet RJ45, DHCP and/or
fixed IP addresses.
A.30
Printers supplied with the AFIS shall include a self-calibration feature to ensure proper
grayscale and 1 to 1 image size printing per FBI IQS specifications.
A.31
The replacement of all latent and tenprint workstations will include networked printing
ability to vendor provided IQS certified printers.
A.32
Database activity shall be logged so that the State AFIS System Administrator can
remotely monitor the details of record movement, processing and dissemination within
the AFIS from any workstation based on user permissions.
A.33
The system shall provide an audit trail and reporting capability of all database
transactions that include operator input and system batch processes with a date and time
stamp.
A.34
The priority of an individual transaction must be modifiable by AFIS System
Administrators.
A.35
System transaction logs must be easily accessible to a system administrator via standard,
ad hoc, and/or third party tools (Excel or Access) for record review and controlled by
permissions.
Nortel Government Solutions Incorporated
8
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
A.36
On line AFIS transaction logs shall be maintained in primary storage (State SAN) for a
minimum period of 24 months. After 24 months, the log files will be moved to off line,
secondary storage.
A.37
The system shall be designed to support moving all transaction logs to external media for
long-term storage.
A.38
The AFIS system must allow a CJIS supervisor (who will be a system administrator) the
ability to view and print the history of a selected record.
A.39
Each tenprint record or latent record shall be available for update or manual processing at
only one workstation at any time. Attempts to access the record currently held by another
workstation should trigger a “record in use” message at the second workstation.
A.40
The system shall use queues or queue equivalents for temporary storage of records and
images during processing. Transactions shall be queued according to priority and released
for processing automatically.
A.41
The system shall process transactions when they are received, and shall handle each
request on a first-in, first-out basis within each priority level.
A.42
AFIS workstations shall have the ability to run office automation software (MS Office,
Photoshop CS, or other similar software) provided by the State.
A.43
The system shall register each newly received tenprint record by Process Control Number
(PCN). The PCN is a unique twelve-digit alphanumeric identifier used for each record
submission.
A.44
An AFIS operator shall be able to retrieve by SID# the corresponding tenprint record
from the AFIS tenprint database using any AFIS workstation. The operator shall be able
to display the entire record or to select and enlarge and/or print to an IQS network printer
any fingerprint image in the record in order to manually compare the images of interest to
hard copy containing unknown images.
A.45
The AFIS shall provide a full range of editing tools. These tools must include at a
minimum: contrast adjustment, image enlargement, rotation, the ability to view flat
impressions as well as the rolled, the ability to substitute flat impressions for rolled
images in the case of sequence errors or poor quality images, the ability to change the
search fingers and resubmit the record to the matchers, and the ability to edit the
computer-generated minutiae.
A.46
The AFIS system shall support a search priority system with the ability for authorized
users to modify standard priorities based on user permissions.
A.47
The AFIS system shall allow an operator the ability to view the Work in Progress queue
to determine the status of a record based on permissions.
A.48
The system must enable a user to modify the default search space to include or omit
searching of records of a particular image type (tenprint records, palm print records, and
unsolved latent records) for any individual inquiry.
Nortel Government Solutions Incorporated
9
January 23, 2006
Functional Requirements Document (Final)
2.2.2
Version 2.0
A.49
The AFIS must support SMTP/MIME or MQSeries transmission protocols plus NIST
and future XML messaging to/from other systems.
A.50
The vendor shall provide follow on maintenance and support of all AFIS components for
both software and hardware via a separately negotiated maintenance agreement.
A.51
The printers provided to print fingerprint cards will be FBI IQS certified and will print
the first card within two minutes of receiving the card data and will be able to print at
least one fingerprint card per minute immediately following the printing of the first card.
A.52
Each workstation must be able to access on-line help and workstation documentation,
including user manual, technical manual and maintenance manual. Any authorized
system user must be allowed to access the on-line documentation.
A.53
The system shall be delivered with a minimum of 1 Gigabit internal network backbone to
support all system servers provided within this contract.
Tenprint Processing Requirements
T.1
The system shall provide tenprint accuracy and reliability of greater than 99% with at
least 90% of the true candidates in the number 1 position on the candidate list.
T.2
Each tenprint verification workstation shall be provided with a FBI IQS certified flatbed
scanner to support a search and purge tenprint identification process. This process must
not allow permanent record storage of tenprints in the database.
T.3
The vendor shall provide 22 Tenprint workstations. These workstations will support
tenprint processing, quality control, training, and the disaster recovery system.
T.4
The tenprint workstations shall be capable of displaying a list of candidates ranked by
matcher score. Candidates are ranked in order of highest matcher score sequentially to
the lowest matcher score above the threshold. The length of the candidate list will be
determined by a system default setting that can be modified by the system administrator.
Operators may override the default setting on an individual search basis.
T.5
The System shall auto encode fingerprints with the option for minutiae editing by tenprint
quality control operators.
T.6
If the verification results differ from the validation results, the system shall automatically
forward the transaction to a supervisor for final decision.
T.7
If the tenprint search results in candidates above the threshold, they will be queued in
matcher score order (highest to lowest) for verification.
T.8
The system shall perform image quality analysis and sequence check upon receipt of all
tenprint records.
T.10
Tenprint records that go into an error status shall be automatically placed into an error
queue for review by a tenprint processing supervisor or quality control operator.
Nortel Government Solutions Incorporated
10
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
T.11
The system shall allow searching of ten flat images in support of applicant processing.
These records will only be searched and purged immediately upon completion of
identification or non-identification. The ten flat images captured for applicant processing
will not be permanently stored in the AFIS.
T.12
The system must not allow duplicate State Identification Numbers (SID) to be stored in
the database.
T.13
The system shall automatically launch a search of the unsolved latent database for all
tenprint records that are new inserts into the AFIS tenprint database.
T.14
Upon the automated quality check, a flag shall be set for any fingers not meeting quality
thresholds defined by the State or for out of sequence errors. These records shall be
automatically routed to the quality control queue.
T.15
The system shall be capable of storing new tenprint records to its permanent database
within 60 seconds upon receipt of a SID number from the Transaction Controller.
T.16
The system shall store a composite record (14 images) in the search database composed
of the best quality images from all tenprint submissions. Image substitution based on
higher quality will be done by the system without operator intervention unless the record
is of substandard quality.
T.17
The system should provide for multi-finger tenprint searches for greater accuracy. The
State of Maryland requires that at a minimum, the best four of six fingers be searched.
T.19
The system shall perform all searches independent of any demographic filtering.
T.20
The system shall provide the ability to perform both an OPEN (searching against the
whole database) and a CLOSED search (search that attempts to match the search record
against one or more records from the tenprint database specified by a SID# list).
T.21
The system shall be capable of performing a batch TP/TPID search of the permanent
database, for the purpose of identifying duplicate records.
T.22
The system shall provide an automated consolidation process of all human verification
operator identified duplicate records. Consolidation process is initiated by AFIS and
controlled by IPS/CCH.
T.23
The system shall provide the ability to perform expungements of records through an
electronic process initiated from IPS/CCH.
T.24
The system shall automatically use alternate finger matching in the event of missing or
poor quality images.
T.25
When all tenprint candidate list scores are below the tenprint “no-hit” threshold score, a
“no-hit” response shall be provided to the transaction controller.
T.26
The system shall not allow record updates or inserts for transaction type "IDENT",
executed at an AFIS workstation. (IDENT - Identification verification only, search and
purge.)
Nortel Government Solutions Incorporated
11
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
T.27
The AFIS system shall provide information to the Transaction Controller regarding
image quality improvements and permanent scars for National Fingerprint File (NFF)
compliance.
T.29
The AFIS and the Fingerprint Archive systems must both support Wavelet Scalar
Quantization (WSQ) and Joint Photographic Experts Group (JPEG) 2000 image
compression for finger and palm images at settings compliant with the FBI EFTS and
FBI best practices for high resolution images.
T.30
The system shall log records sent to image quality analysis by capture device and capture
device operator in order that the State might use this information to detect malfunctioning
hardware and operator training needs.
T.34
The system shall have the capability to allow the quality control operator to substitute
flats for rolls and/or revise the finger numbers for rolls acquired out of position (swap
boxes).
T.35
The workstation shall provide for a side-by-side display of the search print and the
corresponding match candidate print. The side-by-side split screen shall be capable of
displaying both images at full resolution at 1,000 ppi.
T.36
The system shall allow operators to review tenprint candidate results on a verification
screen by either requesting the next candidate or requesting the results of a specific
candidate. (Must allow both options.)
T.37
The workstation shall have the capability to print a hard copy of the candidate list to
include at a minimum the candidate SID number and matcher score at operator request.
T.38
The tenprint quality control queue shall be accessible from all AFIS workstations based
on operator permissions.
T.39
The workstation shall provide tools for the quality control operator to resolve sequence
errors, improve image quality or to flag the record as “rejected”.
T.40
The workstation shall display all 14 images and allow the operator to compare any of the
search record images against any or all images in the candidate record.
T.41
The system shall enable an operator to forward a transaction to a supervisory technician
or exception handler with a work related note if they are having difficulty verifying the
identification.
T.42
Restricted by user permissions, each workstation will have the ability to review either the
tenprint verification or quality control queues.
T.43
Upon receipt of a SID #, all new tenprint record submissions shall be inserted into the
tenprint database and shall become available for subsequent searches within 15 seconds.
T.44
The system shall allow cancellation of a search transaction from the search queue, prior
to initiated search, or to delete search results awaiting verification by a supervisor or
operator with appropriate permissions. Deletions and cancellations shall cause an
appropriate message to be transmitted to the Transaction Controller so that records in the
TC do not “hang” waiting for AFIS response.
Nortel Government Solutions Incorporated
12
January 23, 2006
Functional Requirements Document (Final)
2.2.3
Version 2.0
T.45
The system shall provide a method for submitting 10 print searches for identification only
(IDENT transaction) from any AFIS workstation with an IQS scanner. These records
will not be retained in AFIS or any other system.
T.46
Tenprint records that undergo QA update processing shall be stored as the corrected
version in the AFIS system.
T.47
The system shall be capable of automatic encoding of minutiae to process all types of
fingerprints and palmprints. A fingerprint operator will have the ability to manually add,
remove, or adjust the minutiae and re-launch a search.
T.48
The system must be able to support pre-defined search priorities, set by the system
administrator, which can be modified by the user at search initiation.
T.49
The system must process multiple tenprint record types that include but are not limited to:
Criminal, Applicant, Juvenile, Sex Offender Registration, and Identification only.
T.50
The tenprint system shall be sized to support 4 million tenprint records.
Latent Processing Requirements
L.1
For not less than 95% of all latent searches where the unknown latent print has at least 10
identifiable minutiae points with no filters added, if a corresponding fingerprint or palm
print image is registered in the system, that matching record must be identified in the
respondent candidate list in one of the top 5 positions, based on the match score.
L.2
For not less than 95% of all latent searches where the unknown latent print and a
corresponding file print have at least 15 minutiae in common with no filters added, the
matching file print record must be identified in the respondent candidate list in one of the
top 3 positions, based on match score.
L.3
For not less than 95% of all latent searches where the unknown latent print and a
corresponding file print have at least 20 minutiae in common with no filters added, the
matching file print record must be identified in the respondent candidate list in the top
position, based on match score.
L.4
The vendor shall provide 26 latent processing workstations to be installed in multiple
remote sites.
L.5
Each Latent Workstation must include FBI IQS Certified flatbed scanner input devices
and the software necessary to scan and submit latent prints at 1000ppi for processing.
L.6
The system shall be capable of providing a list of respondents ranked by a scoring system
in descending order of probability of the correct match for latent searches to the
workstation operator with the option to print hard copy.
L.7
Unsolved latent prints entered by a remote site shall become available for tenprint to
unsolved latent searches within 60 seconds.
L.8
The system shall provide the capability to make an inquiry (search) of the unsolved latent
database, whenever a latent record is added to the unsolved latent database. (Unsolved
latent to unsolved latent database search).
Nortel Government Solutions Incorporated
13
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
L.9
The system must have the capability to search latent fingerprints against both rolled and
flat impressions in the AFIS tenprint database.
L.10
The system must have capability to identify “simultaneous impression” and link multiple
latent as having come from the same person (hand) and rank candidates higher in the
candidate list based on matcher score correspondence from all “simultaneous impression”
images.
L.11
The system should have the capability to perform batch purges on the unsolved latent
database, by date and crime type.
L.12
All latent prints will automatically be searched against the tenprint database and the
unsolved latent database. Latent palms should be automatically searched against the
palmprints database and the unsolved latent palmprints database.
L.13
The system shall provide the capability to automatically search the unsolved latent
database whenever a tenprint record is added to the AFIS database.
L.14
The system shall provide the capability to produce a candidate list to the originating
latent examiner.
L.15
The system shall provide the ability to sort the candidate list by most likely candidate to
least likely candidate based on matcher scores.
L.16
The system must support ULW software on all MAFIS latent workstations with the
ability to electronically transfer “coded” images and minutiae from MAFIS workstation
software into ULW software along with associated Type 2 data.
L.17
The system shall allow the use of third party image editing software (e.g. Photoshop
CS/2) on all latent workstations with electronic import – export of images between latent
workstation and image editing software.
L.18
The system shall allow latent examiners access to the Fingerprint Archive so that they
may easily view, download, and print complete fingerprint and palm print records on
Maryland or FBI card formats. This functionality shall be available at every AFIS latent
workstation.
L.19
The MAFIS system shall have the capability to accept ULW latent search requests and
search all ULW submissions and return candidate lists to the submitting location via both
the State network and the FBI CJIS WAN.
L.20
The latent workstation shall support the import of lifts via multiple media sources. At a
minimum, the system must support CD and USB connectivity. At a minimum, file
formats of TIFF, bmp, JPEG, and NIST must be supported.
L.21
The system shall provide for automated reporting for each latent examiner, to include
new cases, completed cases, and pending verifications.
L.22
System shall have the capability for the State AFIS System Administrator or designated
supervisor based on permissions, to transfer cases from one latent operator’s queue to
another when operators transfer or terminate employment.
Nortel Government Solutions Incorporated
14
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
L.30
The System must have the ability to re-launch a search with varying parameters without
rescanning images, (by recalling the record and modifying descriptive and/or fingerprint
minutiae data).
L.31
The system shall be capable of adding new latent images and changing associated data
within the latent case records.
L.32
The system shall allow cancellation by the operator who launched the search or by the
system administrator, of a search transaction from the search queue, or to delete search
results awaiting verification.
L.33
The system must provide the ability to request an unsolved latent image display by case
number.
L.34
The system shall allow operators to review latent search results on a verification screen
by either requesting “next result” or requesting the results of a specific candidate.
L.35
The full 14 image fingerprint record shall be immediately available to a latent examiner
for all candidate list latents queued for verification with the ability for the latent examiner
to print all 14 images from each candidate at 1:1 size in standard fingerprint card format
using an IQS networked printer.
L.36
The system shall have the capability to allow the operator, upon request, to declare a
primary and/or secondary pattern type for search.
L.37
System shall provide a priority setting system that works to insert higher priority latent
searches in the queues ahead of lower priority latent searches based on permissions.
L.38
The system shall provide for a side-by-side display of the latent print and the
corresponding match candidate print. This side-by-side split screen shall allow display of
1,000 ppi images at full resolution.
L.39
The system must have the ability to continue latent entry if central processing equipment
is temporarily unavailable.
L.40
Based on a latent system's user login, the system must provide the user with the ability to
review any search results related to that user's searches. This function must be available
from any latent workstation.
L.41
The system shall support a default number of candidates to be returned for each inquiry,
and shall enable individual users to increase or decrease the requested candidate list
length for any specific inquiry.
L.42
The system shall provide the latent user the ability to view on screen multiple potential
matching images (from different SID#) along with the latent search print in a single
screen (similar to a photo "lineup"). These are frequently referred to in the industry as
"six packs" and at default, contain the search image and five top candidate images.
L.43
For courtroom presentation of latent fingerprint and/or palmprints cases, the system shall
provide automatic "charting" of minutiae between latent candidates and known images.
This charting, at a minimum, must be saved as JPG or TIFF files; and these files must be
printable on a networked printer.
Nortel Government Solutions Incorporated
15
January 23, 2006
Functional Requirements Document (Final)
2.2.4
Version 2.0
L.44
The system shall provide a way for the original latent examiner to “send” a case to a
second latent examiner either internal or external to the original examiner's agency for
purposes of allowing the second latent examiner to review and verify latent match
results. This process will not transfer ownership of the record.
L.45
The latent user shall have the capability to cancel his/her own search transaction from the
search queue, or to delete search results awaiting search verification. The System
Administrator should be able to cancel any user's transactions.
L.46
The system shall be designed to allow a trained latent user to capture a good quality latent
print, plot 12 or more minutiae points, enter two or more filters and initiate a MAFIS
latent search in less than 10 minutes.
L.47
All Latent Workstations shall allow operators to continue to acquire images, assign
minutiae, and queue latent work for processing during any network or central site
interruption. Once the network or central site is restored, all queued records will be
automatically forwarded for latent search processing.
L.48
The system shall allow a latent operator the ability to launch a tenprint to unsolved latent
search from the latent workstation by entering a State Identification Number. In this
case, the latent examiner can override the system TP/USL threshold value for this
specific search and/or specify a fixed number of candidates to be returned for
verification.
L.49
The Latent Workstation shall enable a technician to segment out individual impressions
from a cluster and encode one or more impressions from the cluster without having to
encode all of them.
L.50
The unsolved latent database shall be sized for 350,000 records.
Latent Palm Processing Requirements
LP.1
The system shall electronically support receipt and processing of Type 15 records
including palm and writer's palm images. Personal identification will be based on
tenprints. Once a SID# is assigned, known palms can be inserted into the palmprints
database.
LP.2
The system shall automatically search the unsolved palm latent file when a new palm
print record is registered in the system.
LP.3
The system must be able to accept and process an entire palm print (lower palm) image as
a single latent image.
LP.4
All latent workstations shall support the analysis of partial and full palm latents.
LP.5
The system shall provide the ability for the latent examiner to declare a searched latent to
belong to a smaller section of the palm and to limit matching to that section when known
to avoid unnecessary use of matcher resources.
LP.6
The palm print system shall be day-one forward, sized to support 3.5 million palm print
records.
Nortel Government Solutions Incorporated
16
January 23, 2006
Functional Requirements Document (Final)
2.2.5
Version 2.0
Transaction Controller Processing Requirements
TC.1
The system will perform editing upon receipt of a NIST message to ensure all records
comply with Maryland NIST standards before further processing. Records that do not
comply with the NIST standard will be rejected, purged, with an electronic response back
to the end user.
TC.2
The Transaction Controller must support both SMTP/MIME and MQSeries transmission
protocols plus NIST, and future XML messaging to/from other systems.
TC.3
The Transaction Controller shall perform check digit validation of the process control
number (PCN) upon the receipt of new tenprint record, as per State provided algorithm.
See appendix for check digit standards.
TC.4
The Transaction Controller will create and monitor ID record workflows based on
Tenprint Transaction Type and apply internal decision logic based on processing results
supplied by all other external systems.
TC.5
The Transaction Controller will receive and process asynchronous NIST tenprint
messages from criminal arrest Livescans (Types 1,2,4/14,8,10.15 or subsets).
TC.6
The Transaction Controller must receive and process asynchronous NIST tenprint records
from applicant Livescans (Types 1,2,4/14, 8).
TC.7
The Transaction Controller must receive and process asynchronous NIST tenprint records
including criminal and applicant records from Cardscans (NIST Types 1,2,4/14,7,15).
TC.8
The Transaction Controller must send criminal and applicant NIST records to MAFIS
and receive identification messages back from MAFIS including SID#, requests for new
SID#, and error messages.
TC.9
The Transaction Controller must convert Type 4/14, 15 JPEG 2000 compressed tenprint
images to Type 4, 15 (500 ppi) WSQ tenprint images before transmission to RAFIS and
IAFIS if necessary.
TC.11 The Transaction Controller must be able to send NIST formatted ID messages back to the
submitting agency to report on identification results from MAFIS and from the FBI
IAFIS.
TC.12 The Transaction Controller ULW router functions must include the ability to forward
ULW search requests to MAFIS from authorized agencies and to block unauthorized
ULW requests from agencies not authorized to submit such requests.
TC.13 The Transaction Controller shall maintain a log of tenprint record file sizes by submitting
device so that Maryland Administrators can investigate potential overcompresson by an
image capture device.
TC.14 Transaction Controller shall perform an analysis of its work in progress database of an
adjustable time interval to identify any records that appear to be "stuck" or "orphaned"
and initiate a report concerning these records to the tenprint supervisor and the system
administrator.
Nortel Government Solutions Incorporated
17
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
TC.15 The State will own and maintain the Transaction Controller code and program upon
acceptance. The State will provide at least two developers who must be integrated into
the TC development team in key positions.
TC.16 The Transaction Controller must support transmission of JPEG and JPEG 2000 Type 10
images to IAFIS.
TC.17 The Transaction Controller must interface with the RAS system in the case of applicant
tenprints for the exchange of Type 2 data.
TC.18 The Transaction Controller must exchange Type 2 data with IPS/CCH in the case of
criminal arrest tenprints to forward Type 2 arrest data, request SID# assignment, request
name search, and status and error messages.
TC.19 The Transaction Controller must interface to the Mugphoto System server to send NIST
Types 1,2,10 messages and status and error messages.
TC.20 The Transaction Controller must interface to Northern Virginia Regional AFIS system
(RAFIS) to transmit copies of arrest tenprint records originating from Montgomery and
Prince George’s Counties.
TC.21 The Transaction Controller must interface to the Fingerprint Archive System to transmit
competed arrest and applicant tenprint records for permanent storage (Types
1,2,4/14,7,8,15).
TC.22 The Transaction Controller must interface to the FBI's IAFIS to transmit criminal and
applicant tenprint records and receive FBI identification responses.
TC.23 The Transaction Controller must maintain a statistical database so that standard and ad
hoc reports can be generated concerning records processed per unit time, by agency, by
submitting device (capture device identifier).
TC.24 All system reports shall be available indefinitely in order to support historical analysis
and audit of the processing of individual records.
TC.25 The system shall include reports that summarize input, normal and abnormal processing
activities and output. The content, organization, filters and variables of these reports
shall be configurable by the operator and/or the System Administrator.
TC.26 The Transaction Controller shall provide record error monitoring and reporting to the
Systems Administrator on an immediate basis so that corrective action may be taken to
handle "defective" records.
TC.27 The Transaction Controller must provide an administrator user interface so the tenprint
supervisors and/or the systems administrator can investigate and take action to fix or
delete problem records and messages.
TC.28 The System Administrator shall be able to limit the tasks available to a particular user
and/or group of users. Bidder shall describe how access privileges are managed in the
system.
Nortel Government Solutions Incorporated
18
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
TC.29 The Transaction Controller shall provide work queue status to a System Administrator
user interface for system monitoring purposes. A large "status screen" shall be mounted
in the Tenprint Processing area to display TC status.
TC.30 The tenprint supervisor and other authorized users shall be able to inquire as to the status
of any record(s) that is (are) "in progress" within the Transaction Controller workflows
by PCN, submitting agency, or submitting device, from a user interface on the operator's
PC.
TC.31 The Transaction Controller shall be a three-tier application built on the latest technologies
using an application server (IBM Websphere preferred), a Relational Database
Management System (RDBMS), encrypted web services, rule engine, and a thin client
interface.
TC.32 The system shall forward all appropriate (Based on NFF Requirements) criminal arrest
records to the FBI within 60 seconds of completion of the State identification process.
TC.33 The Transaction Controller must apply workflow decision logic to determine the next
step in a workflow based on messages returned from MAFIS, RAS, and IPS/CCH.
TC.34 The Transaction Controller must act as an intelligent router to forward ULW search
requests to IAFIS and to forward IAFIS search results (candidate lists) back to the
submitting ULW.
TC.35 The Transaction Controller must act as an intelligent router to receive ULW requests for
search of MAFIS and to route the MAFIS produced candidate list back to the original
requesting ULW.
TC.36 The Transaction Controller shall translate all coded information into clearly
understandable language prior to forwarding any responses to the end users.
TC.37 The Transaction Controller shall create an FIS Type of Transaction to forward finger
image quality updates and permanent scars or amputations to the IAFIS.
TC.38 The Transaction Controller shall perform check digit validation of the tracking number
upon the receipt of new tenprint records, as per State provided algorithm. See RFP
appendix for check digit standards.
TC.39 The system shall have the ability to select an adjustable number of "lights out" processed
records and send them to a second stage validation queue for manual review. This
process must be adjustable at the System Administrator level with Administrator ability
to turn manual verification on or off and to set the frequency of records to be audited
(every 10th record, every 15th record, etc.)
TC.40 The system must be capable of supporting “lights out” processing of all tenprint searches
utilizing the System Administrator adjustable threshold levels.
TC.41 The Transaction Controller shall be a robust system designed to process each transaction
within 3 seconds upon receipt.
2.2.6
Fingerprint Archive Processing Requirements
Nortel Government Solutions Incorporated
19
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
FA.1
The Fingerprint Archive system shall use the State’s SAN and mirrored disaster recovery
SAN for data storage.
FA.2
The system database shall be designed to support user-friendly search and retrieval of
individual records and system reports.
FA.3
Fingerprint and palmprints images shall be stored in their native original compression,
either JPEG 2000 or WSQ.
FA.4
The system shall be "Read-Only" and not allow any modifications to an archived record.
This includes images and demographic information
FA.5
The system shall support storage and retrieval of both Tenprint and Palmprints records
with associated demographic information.
FA.6
The system shall support an electronic expungement process to flag records in the
Archive, not allowing user access. This process will be controlled by the IPS/CCH and
forwarded via the Transaction Controller.
FA.7
The system shall log all transactions relating to user access, record retrieval, card
printing, and automated functions such as expungements and consolidations. The
transaction log must be viewable by the State Systems Administrator.
FA.8
For all expungements requests, the system shall print a fingerprint card. Each card must
be labeled in the top margin of the card "Expungement Request - DATE".
FA.9
As part of the expungement process, the system shall flag specific record(s) associated to
each PCN, SID, and/or tracking number to be expunged, from the database after printing.
FA.10 The system shall allow for an automated consolidation process upon identifying duplicate
SID numbers. This process will be initiated by the AFIS upon identification and will be
communicated by the Transaction Controller.
FA.11 The system shall report back to the Transaction Controller when each record is
successfully inserted into the database.
FA.12 If a record is not successfully inserted into the database, the system shall generate an
error message to be returned to the Transaction Controller. The Transaction Controller
must display this message in easy to understand language at the operator level.
FA.13 The system shall be designed so that it shall only accept insertions and deletions from the
transaction controller.
FA.14 The Fingerprint Archive system should use a mainstream RDBMS: State prefers Oracle,
DB2 or MSSQL Server.
FA.15 The system shall interface with the Transaction Controller for receipt of completed
tenrpint / palmprint records and for system administration messages such as errors and
expungements.
Nortel Government Solutions Incorporated
20
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
FA.16 The Fingerprint Archive system should allow the creation and printing of State and FBI
Criminal and Applicant fingerprint cards to FBI IQS networked printers. All printing will
be done on blank cardstock.
FA.17 Tenprint records printed from the Fingerprint Archive system will be printed with a “MD
CJIS” certification watermark. This certification will serve the purpose of verifying the
record is a true copy of the original.
FA.18 The system must have the ability to reproduce a fingerprint card for court that is a true
copy of the original. (Records that originate as electronic records from Livescan shall
print on Maryland’s criminal arrest or applicant forms as appropriate to the transaction
type. Additionally FBI arrest and applicant format shall be supported for printed cards.)
FA.19 The system shall provide the capability for on-line reporting based on user permissions.
FA.20 The system shall provide ability to create custom reports, as determined by the State.
(See Table 2.1 of section 2.2.10 System Management and Reporting)
FA.21 The system shall allow the system administrator, through user profiles to enforce record
access to the archive database.
FA.22 The system shall allow for a Systems Administrator to view and correct transmission or
system related errors if they occur.
FA.23 The vendor must support an enterprise licensing for the archive system clients, allowing
the State to issue access to the Archive system based on the number of user licenses.
FA.24 The Archive search shall permit the location of an individual's tenprints/palmprints by
search on SID# followed by a pick list for specific tenprint records for the individual.
Searches by other data elements shall result in a pick list or else a specific tenrpint record
(PCN search).
FA.25 The system shall provide the ability to view the full 14 image fingerprint record and
associated palmprints (if available).
FA.26 The system shall provide the operator with the capability to select any image for single
image display, enlargement or enhancement using available image processing tools
through the Archive System. Any changes to the displayed image will not affect the
image stored in the permanent database.
FA.27 The archive system must provide the ability for a user to run the archive client software
and access the archived records from any tenprint or latent workstation via a web browser
based on permissions.
FA.28 The archive system must allow an operator to retrieve a record based on either the
original SID or the consolidated SID numbers and display all records associated to the
SID in a pick list for operator review.
FA.29 The system shall provide the ability to "sort" on all the search columns based on unique
parameters, as agreed upon during system design.
Nortel Government Solutions Incorporated
21
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
FA.30 The Archive system shall reproduce an electronic record in the format of a MD Criminal
and Applicant card as well as an FBI criminal or applicant card format appropriate to the
original Type of Transaction.
FA.31 The Archive system must have the capability to store, display, and print NIST record
Types 1, 2, 4, 7, 8, 14 and 15 data. Additionally the system must provide the ability to
retrieve, display, and print a Type 10 mugphoto thumbnail image from the Mugphoto
server with the fingerprint record.
FA.32 The Archive system must support SMTP/MIME or MQSeries transmission protocols plus
NIST and future XML messaging to/from other systems.
FA.33 The vendor shall provide follow on maintenance and support of all Fingerprint Archive
components for both software and hardware via a separately negotiated maintenance
agreement.
FA.34 Each workstation must be able to access on-line help and workstation documentation,
including user manual, technical manual and maintenance manual. Any authorized
system user must be allowed to access the on-line documentation.
2.2.7
AFIS Inked Card Conversion Requirements
DC.1
For the purposes of the AFIS, the best quality record on file shall be converted.
DC.2
Duplicate SID numbers should be identified during tenrpint record conversion or during
initial load on the new MAFIS.
DC.3
Image processing during initial tenprint load of the new MAFIS should include minutiae
coding, pattern typing (auto classification) and print quality coding with fingerprint
sequence checks for each finger in each record.
DC.4
Conversion of all inked hard cards shall be done at 1000ppi and JPEG 2000 compression
for the purpose of storage in AFIS (2.5 million records) and the State’s Fingerprint
Archive system (estimated 5.5 million cards).
DC.5
For the Fingerprint Archive system each individual hardcard must be electronically
converted and stored (unaltered) in the database.
DC.6
Converted hardcard records shall be compliant with FBI and NIST standards for
compression and storage.
DC.7
The vendor will supply trained and experienced operators to perform both hard card and
electronic card conversion.
DC.8
Archive conversion must include the scanning of each event record for storage of all
events under the same person ID (SID) in the Archive System. The State will provide
descriptor data via electronic media for each card converted listed by SID and Event
Number.
Nortel Government Solutions Incorporated
22
January 23, 2006
Functional Requirements Document (Final)
DC.9
Version 2.0
The bidder must state the number of cards or electronic records per week to be converted
and the length of time cards will be out of file. The bidder must clearly define any tasks
that will be the responsibility of the State.
DC.10 All card conversion will be performed at the Maryland State designated location.
DC.11 All descriptor data in current system shall be brought from the existing electronic archive
database via electronic media provided by the State.
DC.12 Converted electronic records should be compliant with FBI and NIST standards for
compression and storage. (The records are currently in NIST format with original WSQ
compression).
DC.13 All electronically submitted tenprint fingerprint records in the current Fingerprint
Archive system database shall be transferred into the new AFIS and Fingerprint Archive
System at 500 ppi.
2.2.8 Fast Identification
FI.1
Capture devices for Probation Dept. will be USB single finger flat image scanners with
client software set to capture two flat images. Pilot quantity is 4 units. Optional twofinger simultaneous capture device will be considered.
FI.2
Vendor will supply mobile WiFI (802.11g) PDA type capture devices for Dept. of
Corrections. Pilot Quantity is 8 units. State will supply wireless network.
FI.3
The system shall capture two fingers' flat images sequentially or optionally
simultaneously.
FI.4
FAST ID system shall retrieve a thumbnail photo, if available, from Mugshot server and
transmit to user along with FAST ID matching SID# result.
FI.5
FAST ID client shall display search results including at a minimum SID#, small photo,
Name, address, SSN depending on data availability.
FI.6
The FAST ID system must accept records containing one, two, or more finger images
captured at 500 or 1,000 ppi, compressed using WSQ or JPEG 2000. FAST ID images
may be rolled or flat.
FI.7
The FAST ID record structure may be NIST format, M1 format, or SC37 format. FAST
ID records may contain fingerprint images or extracted minutiae (without images) per M1
and SC 37 standards.
FI.8
All FAST ID capture messages will be via TCP/IP.
FI.9
FAST ID system must support processing of FAST ID submissions from third party
vendors as long as message formats conform to NIST, M1, or SC 37 standards.
FI.10
The FAST ID system shall log and store transaction information including submitting
agency, capture device identifier, image quality date, time, match results suitable to
determine processing time and possible device quality problems.
Nortel Government Solutions Incorporated
23
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
FI.11
FAST ID shall NOT use the Transaction Controller. Vendor must supply appropriate
system interface that supports 128-bit encryption and message controller between AFIS
matching system and FAST ID capture devices. (Maryland will supply the network).
FI.12
FAST ID system shall enable reporting by user, device, agency, date, time and result
(match to SID# or no match) for managerial and statistical purposes.
FI.18
The vendor shall provide follow on maintenance and support of all back end Fast ID
components for both software and hardware via a separately negotiated maintenance
agreement.
2.2.9 Mugshot System
MS.1
The system should have the ability to export images in NIST Type 10 format.
MS.2
The system shall provide a browser-based query interface.
MS.3
The vendor shall provide an enterprise license of the client software for installation on
State provided hardware.
MS.4
Mugphoto software shall be made available on all latent and tenprint workstations at a
minimum.
MS.5
The system shall use the State’s SAN for data storage.
MS.6
The system shall provide automatic system monitoring tools to include real time
detection of system hardware or software failures.
MS.7
The system should have flexible identification indexing to be able to link records across
multiple systems using common identification attributes (e.g. SID number, PCN, Arrest
date, time and location) as needed.
MS.8
The Transaction Controller shall automatically send all associated photos to the
Mugphoto server upon SID assignment.
MS.9
The system shall provide automated parametric search of the photo records database and
retrieval of images for all records satisfying the search parameters (e.g., height, weight,
gender, race, hair color, group affiliation, etc.).
MS.10 The system shall provide automated search of the photo records database and retrieval of
all images similar to a specified search record (i.e., individuals with the same physical
characteristics as a specified subject).
MS.11 The system shall perform an automated search of the photo records database and retrieval
of all records for individuals with a specified tattoo.
MS.12 The system shall not allow any permanent editing of photo record information by any
user, without first logging the reason for the modification along with the photo record.
(Modifications to the photo image will be prohibited.)
Nortel Government Solutions Incorporated
24
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
MS.13 The system shall support an automated consolidation process. This process will be
controlled by the IPS/CCH system and transmitted through the Transaction Controller.
MS.14 The system shall support an automated expungement process to flag selected records
from the central photo repository database, making the record inaccessible by a user.
MS.15 The system shall provide automatic logging of each transaction event from receipt,
processing, and response stages.
MS.16 The list of records returned to the operator during a record retrieval process must be
displayed in chronological order. (Most recent first)
MS.17 The system must automatically store and use for facial recognition the most recent photo
images of an individual.
MS.18 The system shall store all photos received for each individual, indexed by SID, PCN
and/or tracking number. The PCN or tracking number will identify a specific event.
MS.19 A thumbnail photo image (full face) shall be accessible to support FAST ID and the
Fingerprint Archive systems.
MS.20 The vendor shall provide line item costs for facial recognition capabilities as an optional
cost.
MS.21 The system should accept the record into the server in NIST Type 10 format with
associated demographic data in Type 2 format.
MS.22 The system shall include, but not be limited to the following image profiles: front, left
profile, right profile, scars, marks and tattoos.
MS.23 The facial recognition package shall provide the ability to enable a facial recognition
search of the photo records database, and retrieval of all identified matching or possibly
matching images, including storage of matched photos for later retrieval without the need
to repeat the prior search.
MS.24 The color photo image must be digitized and stored with a resolution that is at least the
resolution specified in the standards outlined in the NIST Best Practice Recommendation
For The Capture Of Mugshots (Version 2.0).
MS.25 Photo images stored in the State's database must be stored as compressed files using the
JPEG 2000 compression algorithm.
MS.26 The system shall be designed to allow the addition of a facial recognition software
package as a separate module for a future enhancement without requiring any major
system changes.
MS.27 The vendor shall provide network ready color printers for optional purchase.
MS.28 The system shall provide the ability to generate hardcopy prints of the record data and
color photographs, including the capability to print on a network-connected color printer.
Nortel Government Solutions Incorporated
25
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
MS.29 Printing of photo or fingerprint images at a specific Remote Workstation must be
controlled as an agency option. Some agencies may not wish to automatically print photo
images and/or fingerprint images as part of the search response.
MS.30 The vendor shall supply both preconfigured reports and the ability for the System
Administrator to easily generate ad hoc reports.
MS.31 The system shall provide reporting features which access the database management
systems for the on-line photo database and provide standard and ad-hoc reports relating
to photo database administration (e.g., management reports, statistical reports, etc.).
MS.32 The system shall provide interactive tools to allow the State system administrator to
monitor all processes and queues, and to detect and correct system operational problems.
MS.33 The system must provide interactive tools to the State System Administrator to access
transaction logs for performance and activity analysis.
MS.34 The system shall provide for remote access to support troubleshooting and maintenance
capability. This will allow a remotely located system engineer to operate system
diagnostics, correct operational problems and download software modifications.
MS.42 The operator shall have the capability of making an on-screen indication that the photo
image must be retaken at a later date.
MS.43 The system shall provide retrieval and display of any user-selected image or all images
for a specified individual, along with all associated record information.
MS.44 The photo system shall organize and display all data for an individual in record format or
line-up format, with user controls providing unrestricted capabilities for selecting and
modifying views of the data.
MS.45 The system shall allow an operator to copy selected records to a removable media
consistent with industry best practice (i.e. optical, DVD, DAT, etc.).
MS.46 System generated errors shall be provided on screen to the end user in understandable,
user level terms.
MS.47 Each workstation must be able to access on-line help and workstation documentation,
including user manual, technical manual and maintenance manual. Any authorized
system user must be allowed to access the on-line documentation.
MS.48 The record retrieval software shall allow an operator to retrieve a record based on criteria
of SID, PCN, and name at a minimum.
MS.49 The Mugphoto System must support SMTP/MIME or MQSeries transmission protocols
plus NIST, future XML messaging to/from other systems.
MS.50 The vendor shall provide follow on maintenance and support of all Mugphoto system
components for both software and hardware via a separately negotiated maintenance
agreement.
Nortel Government Solutions Incorporated
26
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
2.2.10 System Management and Reporting
SM.1
The vendor must provide a Systems Operations and Support document that outlines the
processes and procedures taken to ensure the AFIS, FAST ID, Archive, and Mugphoto
systems are maintained and supported to the required performance standards. This
document must be approved by the Maryland DPSCS.
SM.2
Reports shall include information on: operator performance, accuracy, counts of records
received, rejected at each edit point, records processed - longest time shortest time,
average time, etc. (A listing of minimal reports for each subsystem is outlined in Table
2.1)
SM.3
The reporting functionality shall allow the System Administrator the capability to limit
operator access to reports through individual user’s roles settings.
SM.4
The vendor shall supply both preconfigured reports and the ability for the System
Administrator to easily generate ad hoc reports using vendor provided or third party
software (e.g. Crystal Reports).
SM.5
The system shall include reports that summarize input, normal and abnormal processing
activities and output. The content, organization, filters and variables of these reports
shall be configurable by the operator and/or the System Administrator.
SM.6
All system reports shall be available indefinitely in order to support historical analysis
and audit of the processing of individual records.
SM.7
No reporting data will be destroyed throughout the life of the contract without written
permission from the Maryland DPSCS.
SM.8
The report system shall support the retrieval and display of any system statistical data
without impacting system performance.
SM.9
The system reports shall support the ability to export data into standard MS Office Excel
spreadsheet or Access database.
SM.10 The system shall include on-line monitoring and system administration, which can be
operated remotely through a Virtual Private Network (VPN).
SM.11 The system must maintain transaction logs to assist in recovery of data files.
SM.12 The system should have the capability to allow the system administrator to modify the
number of candidates returned to a workstation through threshold modification.
SM.13 The system should have the capability to allow the system administrator to adjust the
threshold levels for 'lights out' performance.
SM.14 The System Administrator shall be able to limit the tasks available to a particular user
and/or group of users. Bidder shall describe how access privileges are managed in the
system.
SM.15 The vendor shall provide ample on-site support staff for the AFIS, FAST ID, Archive,
and Mugphoto systems to support the required availability. This support will be available
Nortel Government Solutions Incorporated
27
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
on-site during the normal work week of Monday through Friday, 8:00 AM to 5:00 PM
throughout the warranty period. Support will be available on-site after the warranty
period at the option of the State.
SM.16 The vendor will provide on-call support 24 X 7 X 365 for any system performance or
operational issues within fifteen minutes of the first attempt to contact the on-call
support.
SM.17 Each on-call technician must have high-speed remote access (vendor provided at vendor
site) into the system to perform system maintenance. State will work with vendor to
provide VPN secure access.
SM.18 The systems shall provide an easy display of all error queues and system exceptions for
State Administrator viewing and printing.
SM.19 The systems queue transaction activity display shall be automatically refreshed at an
adjustable rate. Recommend refreshing within 3-5 minute intervals.
SM.20 The AFIS and Transaction Controller systems queue transaction activity displays shall be
available for display at any time on any workstation in the system based on user
permissions.
SM.21 The vendor shall place all accepted software for all system components of AFIS,
Fingerprint Archive, Fast Identification, and Mugphoto Systems in Escrow. This Escrow
account will be available to the State if the selected vendor discontinues business and will
become the property of the State of Maryland. (Includes all system upgrades and
enhancements.)
SM.22 On-Site support must be available within one hour of notification if resolution cannot be
done remotely.
Nortel Government Solutions Incorporated
28
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
Table 2.1 Reporting Requirements
System Component - AFIS
Report Description
Production Reports
Periodic Statistical Reports - Report of processing
data from a selected start date and end date. Report
must include at a minimum, number of records
processed by type, site location, average processing
time, and number of hits made. Reports must be
available for each subsystem of Tenprint, Latent, and
Fast ID processing.
Detailed Monthly/Weekly Statistical Reports Provide information on Month or Week selected and
provide information on average processing time for
each transaction type received. Reports must be
available for each subsystem of Tenprint, Latent, and
Fast ID processing.
Daily Statistical Reports - Provide daily information
on number of records processed, by location, with
average processing time. Reports must be available for
each subsystem of Tenprint, Latent, and Fast ID
processing.
Hourly Statistical Reports - Provides a number of
records processed by hour by record type. Reports
must be available for each subsystem of Tenprint,
Latent, and Fast ID processing.
Quality Rejection Report - Provide rejection
information on all records sent to QC due to poor
quality or sequence errors by date/time range.
Information will be available by site location.
User Performance Report - This report will be
available to individual operators, supervisors or
managers to display based on permissions. Report will
provide number of records processed and decision
made. This report will be available by date range or
individual record.
Transaction Inquiry Report - This report must be
available for operator, supervisor and administrator use
to provide all information regarding a specific
transaction upon request. (for completed and
incomplete transactions.) Event information such as
coding, quality, verification, hit/no-hit, and associated
user interaction will be indicated.
System Administration Reports
Nortel Government Solutions Incorporated
System Capacity Report - Report must indicate the
number of records in the database, number of new
records added by adjustable time period, and the
29
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
anticipated time the system will meet the contract
capacity.
System Error Report - Provide a report of all system
generated errors and the number of each error logged
by date range and/or error type.
System Availability Report - This report will be
available either daily, weekly, monthly, or annually.
This report will indicate the system operational status
for both Fully Operational and Reduced Capacity
operations.
System Security
User Activity Report – provides a listing of all
date/times when each individual logged on and off the
system. Report can be ran by individual or site location
based on date/time range.
User Access Listing – this report will provide a list of
all current users with the date of creation and the date
of last login.
Security Incident Report – this report will identify all
invalid login attempts by location/workstation or User
ID for a given time period.
System Component – Transaction
Report Description
Production Reports
System Activity Report - Report will include the
number of records processed by type with an average
processing time. The option to break down information
by agency must be available. The report will have the
option to include listing all activities completed. (i.e.
successful submission to RAS, IPS/CCH, Archive,
Mugphoto, RAFIS, IAFIS)
Response Time Failure Report - Report will provide
a listing of all records that did not meet the Service
Level Agreement timeline for processing. Each record
identified will outline the processing steps with
date/time indicator for troubleshooting purposes.
Quality Override Report - This report can
generated upon request and sorted by User for
Livescan or Cardscan records indicating quality
sequence overrides performed. The report can
generated by site location, and/or Operator.
be
all
or
be
IAFIS Transaction Report - Report will outline the
number of records submitted to IAFIS by date period
for both tenprint and latent submissions. The number
of rejected records will be available on the report. The
average response time will be indicated.
Expungement/Consolidation Report - This report
will identify and list all expungements and/or
Nortel Government Solutions Incorporated
30
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
consolidations for a given time period requested by the
system. This report must indicate the success of failure
of each associated system, i.e. AFIS, Archive,
Mugphoto. Additionally a summary report will provide
the number of records expunged or consolidated over a
period of time.
System Administration Reports
System Availability Report - Report will provide the
operational availability status of the Transaction
Controller for a specified time period.
Error Reporting - Error reports will be available for
all system activities. These activities will include at a
minimum, NIST Edit errors, all subsystem provided
errors relating to AFIS, Mugphoto, and Archive system
updates.
Lights Out Decision Report - The report will be used
to determine threshold adjustments. The report must
indicate the number of records that generated a hit
decision by the Verification Operator with the
candidate in the number one position including matcher
score. Additionally, this report will provide the number
of ‘lights out’ hit decisions made. All hits outside of
the number one position on the candidate list will also
be shown for assistance in the decision making process.
System Security
User Activity Report – provides a listing of all
date/times when each individual logged on and off the
system. Report can be ran by individual or site location
based on date/time range.
User Access Listing – this report will provide a list of
all current users with the date of creation and the date
of last login.
Security Incident Report – this report will identify all
invalid login attempts by location/workstation or User
ID for a given time period.
System Component – Archive
Report Description
Production Reports
System Activity Report - Report of all new record
inserts/updates for a given period of time.
System Activity Report - This report process will have
the ability to identify all activity for a given record.
User information that accessed and/or printed the
record.
Expungement/Consolidation Report - This report
will identify and list all expungements and/or
consolidations for a given time period. Additionally a
summary report will provide the number of records
expunged or consolidated over a period of time.
Nortel Government Solutions Incorporated
31
January 23, 2006
Functional Requirements Document (Final)
System Administration Reports
Version 2.0
System Availability Report - Report will provide the
operational availability status of the Archive for a
specified time period.
System Capacity Report - Report will provide a list of
all records, tenprint – palmprint specific in the Archive
system. The growth by month since the system was
installed. Estimated date when the system contracted
capacity is met.
Error Reporting - This report will identify all errors
generated resulting from insert or update failures,
expungement or consolidation failures.
System Security
User Activity Report – provides a listing of all
date/times when each individual logged on and off the
system. Report can be ran by individual or site location
based on date/time range.
User Access Listing – this report will provide a list of
all current users with the date of creation and the date
of last login.
Security Incident Report – this report will identify all
invalid login attempts by location/workstation or User
ID for a given time period.
System Component – FAST ID
Report Description
Production Reports
System Activity Report - Report of all search requests
by location or device number for a given period of time
with the number of hits identified. Report will provide
the ability to define by hour, day, week, or month.
System Administration Reports
System Availability Report - Report will provide the
operational availability status of the Fast Identification
system for a specified time period.
Error Reporting - This report will identify all errors
generated resulting from search requests.
System Security
User Activity Report – provides a listing of all
date/times when each individual logged on and off the
system. Report can be ran by individual or site location
based on date/time range.
User Access Listing – this report will provide a list of
all current users with the date of creation and the date
of last login.
Security Incident Report – this report will identify all
invalid login attempts by location/workstation or User
ID for a given time period.
System Component – Mugphoto
Report Description
Production Reports
System Activity Report - Report of all search requests
by location or device number for a given period of time
Nortel Government Solutions Incorporated
32
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
with the number of hits identified. Report will provide
the ability to define by hour, day, week, or month.
System Administration Reports
System Availability Report - Report will provide the
operational availability status of the Mugphoto system
for a specified time period.
System Capacity Report - Report will provide a list of
all photo records in the system, the growth by month
since the system was installed. Estimated date when
the system contracted capacity is met.
Error Reporting - This report will identify all errors
generated resulting from search requests.
System Security
User Activity Report – provides a listing of all
date/times when each individual logged on and off the
system. Report can be ran by individual or site location
based on date/time range.
User Access Listing – this report will provide a list of
all current users with the date of creation and the date
of last login.
Security Incident Report – this report will identify all
invalid login attempts by location/workstation or User
ID for a given time period.
Nortel Government Solutions Incorporated
33
January 23, 2006
Functional Requirements Document (Final)
3
Version 2.0
OPERATIONAL REQUIREMENTS
Operational requirements describe the non-business characteristics of an application and deal
with the operations of the information technology components.
3.1
Security
All AFIS software components shall provide a mechanism for protecting system data and the
operational environment from compromise or unauthorized access. It includes the ability of the
COTS software to prevent malicious as well as non-malicious security breaches. The COTS
software shall provide a security mechanism that does not require a user or administrator within
the product to have local or domain admin privileges within the operating system. All systems
must follow the Maryland Department of Budget and Management Office of Information
Technology Information Technology Security Policy and Standards document Version 1.3 dated
December 2005.
The following requirements support the protection of the system required by DPCSC:
S.1
Login access shall be controlled with a unique user login name plus password. (State
prefers the utilization of LDAP to a State directory.)
S.2
Password shall be modifiable by each user and password modification shall be allowed
from the user's workstation.
S.3
The vendor shall use the security templates developed by the State, if available.
Otherwise the vendor shall supply their own security templates and provide the templates
to the State System administrators.
S.4
The system shall require a re-definition of passwords on a periodic basis (e.g. Every 45
days) interval to be modifiable by the State.
S.5
The State System Administrator should be able to add and delete users and/or require
update of password(s).
S.6
The system shall produce intrusion alerts for unsuccessful login attempts beyond State
specified threshold.
S.7
State System Administrator shall have the ability to set a system directed automatic
logout for operator inactivity.
S.8
The system shall allow only connection to the DPSCS intranet (via the internet), through
VPN or SSL. There shall not be any remote dial-up access. Note: State will provide all
necessary firewall hardware and VPN components.
S.9
The State’s AFIS System Administrator shall manage System and subsystem security
centrally. As an option, the Administrator shall be able to assign remote site
administrators for the purpose managing local user access.
S.10
The State System Administrator shall have the power to immediately terminate an enduser’s session(s).
Nortel Government Solutions Incorporated
34
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
S.11
The system shall not allow a user to have more than one session active on the same
system at the same time.
S.12
Any attempt to log into a workstation with an invalid user name/password shall be logged
at the central site.
S.13
Intrusion attempts shall be identified in real time and an alarm notice based on State
defined threat levels shall be immediately sent to the AFIS System Administrator.
S.14
The AFIS security scheme shall record operator activities and access to system and
subsystem components. In particular, details for each record addition, edit and deletion
shall be available for review.
S.15
The proposed AFIS technology shall provide the necessary log files for tracking all latent
and tenprint transactions, whether received or transmitted electronically or manually.
S.16
The vendor shall ensure that all security log files be maintained in primary storage (State
SAN) for a minimum of 24 months. After 24 months, logs will be moved offline to
secondary storage.
S.17
The vendor shall ensure that all log files are protected from modification.
S.18
Assign security access by user, role and/or group. Examples of roles include Supervisor,
Senior Operator, and Entry Level Operator.
S.19
Have an order of security precedence, such as user id, role and group.
S.20
Have the ability to grant roles to users and have the user inherit the security access
granted to all roles assigned to the user.
S.21
Allow association of one or more groups to a user.
S.22
Test and Training databases must be separate from operational databases.
S.23
The system shall allow the system administrator to invoke security changes immediately
(i.e. system restart is not required to effect security changes).
S.24
The AFIS shall use the State's enterprise anti-virus software if applicable to the operating
system chosen. Otherwise the vendor shall supply an anti-virus and malware
management plan appropriate for the AFIS environment.
S.25
The Transaction Controller shall use the State's enterprise anti-virus software if
applicable to the operating system chosen. Otherwise the vendor shall supply an antivirus and malware management plan appropriate for the Transaction Controller
environment.
S.26
The Fingerprint Archive shall use the State's enterprise anti-virus software if applicable
to the operating system chosen. Otherwise the vendor shall supply an anti-virus and
malware management plan appropriate for the Fingerprint Archive environment.
Nortel Government Solutions Incorporated
35
January 23, 2006
Functional Requirements Document (Final)
3.2
Version 2.0
S.27
The Mugphoto Server shall use the State's enterprise anti-virus software if applicable to
the operating system chosen. Otherwise the vendor shall supply an anti-virus and
malware management plan appropriate for the Mugphoto Server environment.
S.28
The Fast ID shall use the State's enterprise anti-virus software if applicable to the
operating system chosen. Otherwise the vendor shall supply an anti-virus and malware
management plan appropriate for the Fast ID environment.
S.29
Biometric logon is a desirable option to the State. Vendors shall describe the use of this
feature if available with their proposed solution.
S.30
The vendor shall ensure that all audit trail logs are accessible to CJIS-CR administrators
and their designees for use in performance evaluations and problem solving.
Audit Trail
The AFIS security scheme shall record operator activities and access to system and subsystem
components. In particular, details for each record addition, edit and deletion shall be available for
review.
The proposed AFIS technology shall provide the necessary log files for tracking all latent and
tenprint transactions, whether received or transmitted electronically or manually. Further, all
changes and releases for each record shall be recorded in these log files. Logging shall be
accomplished in a manner that facilitates reviews, searches and reporting of actions that have
taken place within the AFIS environment. Additionally information regarding system audit trail
requirements can be found in the Maryland Department of Budget and Management Office of
Information Technology Information Technology Security Policy and Standards document
Version 1.3 dated December 2005.
The Vendor shall ensure that all audit trail logs are:
3.3
3.4

Retained according to parameters that will be specified by the ITCD:

Backed up and deleted from the system in accordance with scheduled security backups

Protected from modification

Accessible to CJIS-CR administrators and their designees for use in performance
evaluations and problem solving
Networking
N.1
The system shall be able to accommodate remote latent or tenprint workstations with
minimum communication rates of .5 T1-capacities (750 kbs). These workstations shall
have acceptable response times for the user, in accordance with the Business
Requirements.
N.2
The system shall support direct communications with either Ethernet (locally) or a
substantially equivalent media.
N.3
The vendor shall ensure that secure communication is used in the operation of all
subsystems. Further, TCP/IP shall be used by all network solutions.
Data Currency
Nortel Government Solutions Incorporated
36
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
AFIS is a real time mission critical system that requires data to be stored and be available as soon
as possible. The following are some examples within the AFIS system that require data to be
current.
Process Queues – All process queues that show the work in process for fingerprint identification.
The system queue transaction activity display shall be automatically refreshed at an adjustable
rate. Recommend refreshing within 3-5 minute intervals. The system queue transaction activity
display shall be available for display at any time on any workstation in the system by authorized
users.
Tenprint – prints and mug photos should be stored and available for searching immediately after
being identified by the AFIS system and a SID# has been assigned.
Unsolved Latents – Unsolved latent prints entered by a remote site shall become immediately
available for tenprint to unsolved latent searches.
3.5
Reliability
The system servers shall allow for secure remote administration. These systems shall provide for
automatic alerting to system administrators and State personnel when there are problems or
failures with the system software and hardware. This provides monitoring and support,
minimizing the need for on-site personnel. This will result in avoidance of outages and shorter
down time when there is an outage.
3.6
System Availability
The system shall be a high availability system that operates on a twenty-four hours per day, seven
days per week, 365 days per year basis (24 x 7 x 365). The system should meet 99.99%
availability. Software maintenance must be performed without requiring system downtime. The
system will be considered down whenever normal AFIS operations cannot be conducted without
experiencing major system alarms or conditions that inhibit or prevent the user from performing
vital processing functions.
3.7
Fault Tolerance
SA.1
All critical system components must be protected through the use of redundant
components. Switchover shall be automatic and shall not require ANY manual
intervention. (This does not include catastrophic events.)
SA.2
The system should meet 99.99% availability on a monthly basis. Maintenance activities
shall not interrupt production performance. The system will be considered down
whenever normal AFIS operations cannot be conducted to support the system throughput
requirements.
SA.3
The power supply for the servers should be modular and should include redundancy such
that the power supply system is capable of meeting full and continued supply of server
power.
SA.4
The system shall provide for automatic alerting to system administrators and State
personnel when there are problems or failures with the system software and hardware.
Nortel Government Solutions Incorporated
37
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
SA.5
The system shall support back-up processes that do not require system downtime or
reduced performance.
SA.6
System availability is measured on a monthly basis, starting at 12:00am Eastern Standard
Time (EST) on the first day of each month and ending at 11:59pm EST on the last day of
the month. Note that allowable downtime does not accumulate from month to month, but
is reset at the beginning of each month.
SA.7
The vendor shall provide a script that will allow for the automatic start-up of the system
and application components when a server powers up.
SA.8
At minimum, system generated statistical reports of daily, weekly, monthly and yearly
performance shall be readily available to the State AFIS Administrator.
SA.9
System availability reports shall cover date, time and duration for all recorded events,
outlining System Unavailability or Reduced Capacity operations within the period
selected for the reporting. (Recorded events must include any system interruption that
impacts production.)
SA.10 The system must be designed to operate in a 'Reduced Capacity' mode if system
malfunctions occur. At a minimum, 50% of the total volume of transactions, including
100% of the priority 1, 2, and 3 transactions shall be processed within their normal
response time.
SA.11 At a minimum, the System shall only function in a Reduced Capacity mode for a
cumulative maximum of 48 hours per year, for a duration not to exceed 12 hours within
one month.
SA.12 The vendor must provide a one year warranty on all hardware and software provided.
The warranty period begins upon full acceptance of each system.
SA.13 The vendor and appropriate sub-system vendors shall provide follow-on maintenance
support for AFIS, Fingerprint Archive, Fast Identification, and Mugphoto systems. The
vendor shall provide a draft Maintenance Plan with their proposal outlining the below
listed categories:
o
Help Desk Services
o
Method of Notification
o
Escalation Procedures
o
Problem Escalation
o
Non-Performance Penalties
o
Test Equipment
o
Installation, Verification and Validation (IV&V)
o
Software Defects
o
Upgrade Support
o
Enhancements
o
VPN Connectivity
Nortel Government Solutions Incorporated
38
January 23, 2006
Functional Requirements Document (Final)
3.8
Version 2.0
Disaster Recovery
DR.1
The State will provide an off site location for disaster recovery, the vendor shall provide
the hardware and software to operate the following systems: AFIS, Transaction
Controller, Fast Identification, Fingerprint Archive, and Mugphoto.
DR.2
The Vendor shall propose hardware for the disaster recovery site that will allow the State
to operate at a minimum of 50% capacity with short-term plan to provide 90%
availability within 7 days.
DR.3
In the event of a disaster, the Vendor shall be capable of failover to the disaster recovery
site within one hour.
DR.4
The Vendor shall use the State provided SAN device at the disaster recovery site and
replicate the required data for the disaster recovery system. (The DR SAN is of the same
model as the primary).
DR.5
The Vendor shall provide a method of data replication that provides real time replication
with no more than 2 minutes latency between the primary and secondary storage devices.
DR.6
Equipment provided under this RFP, shall be connected to State provided UPS units.
Sufficient UPS capacity will exist at both primary and recovery sites.
DR.7
All servers shall be configured with automated scripts for controlled shutdown, and
automatic startup without manual intervention in the event of primary power failure and
UPS battery depletion.
DR.8
The successful Vendor shall provide a single, detailed IT Disaster Recovery/IT Business
Continuity Plan (Plan) addressing the needs of DPSCS. This plan should cover a variety
of likely situations and may include various options for response.
DR.9
The Vendor shall provide in its recommendations the step-by-step sequence of actions
and associated disaster recovery team position-responsibilities needed to re-locate
facilities and functions to their alternate sites.
DR.10 The Vendor shall include the associated DRT (disaster recovery team) positionresponsibilities to restore IT facilities and functions to their pre-event status.
DR.11 The Vendor shall provide, and keep current, electronic and paper copies of the following
to be stored at State provided off-site storage: For all system components, the documents
should include custom code and corresponding design and support documentation, server
configurations, design, support and maintenance documents.
DR.12 Vendor shall include recommendations of proposed level of internal Auditing and
Testing plans for the backup systems; clear statement of Test objectives; description of
Test methods and step-by-step Test methodology; evaluation and optimum use of Test
results; and a proposed Audit and Test frequency and schedule.
Nortel Government Solutions Incorporated
39
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
DR.13 The Transaction Controller (TC) shall be mirrored at the disaster recovery site with the
mirrored TC able to immediately continue processing in the event of failure of the
primary TC.
DR.14 The system shall have a process in which the primary or secondary systems will be resynched and operations will resume at the conclusion of a disaster.
DR.15 The vendor shall provide both training and documentation on the disaster recovery plan.
3.9
Performance
T.31
The system shall be capable of handling throughput to support tenprint processing of 270
records per hour against a database of 4 million records.
T.33
The system shall be capable of processing 270 good quality tenprint records within one
hour on a continuous basis.
L.23
All unsolved latent prints shall be stored in AFIS uncompressed at 1,000 ppi or if
compressed, the compression must not allow any loss of image quality.
L.24
The system shall be sized to process 100 latent to tenprint searches in an 8-hour period
and 300 LT/TP searches in 24 hours against a database of 4 million tenprint records
containing all 14 images and including latent searches against both rolled and flat images.
L.25
The system shall be sized to process 100 latent to unsolved latent searches in an 8-hour
period and 300 LT/UL searches in 24 hours.
L.26
The system shall be sized to process 40 latent palm print to known palm print searches in
an 8-hour period and 120 LP/PP searches in 24 hours.
L.27
The system shall be sized to process 1100 tenprint to unsolved latent fingerprint searches
per day (24 hour period) against a database size of 350,000. See Statement of Work
Section 3.10 for a complete performance outline.
L.28
The system shall be sized to process 15 latent palm print to unsolved latent palm print
searches in an 8-hour period and 45 LP/ULP searches in 24 hours. L.29 The
system
shall be sized to process 120 known palm prints to unsolved latent palm print searches
per day (24 hour period). See Statement of Work Section 3.10 for a complete
performance outline.
FI.13
Fast Identification must process records and transmit search results within 3 minutes of
receipt of the search request and 1 minute of receipt of a 1:1 match request.
FI.14
Fast Identification searches shall be performed against the AFIS tenprint database of 4
million person records.
FI.15
The volume of 1:1 Fast Identification searches will be 1,500 per day with peak hour of
500 searches.
FI.16
The volume of 1:N Fast Identification searches will be 7,000 per day with peak hour of
500.
Nortel Government Solutions Incorporated
40
January 23, 2006
Functional Requirements Document (Final)
FI.17
Version 2.0
The Fast Identification peak hours for 1:1 and 1:N searches could occur concurrently for
a total peak hour volume of 1,000 FAST ID search requests.
MS.35 The Mugphoto system shall be designed to support a database size of 5,000,000 records
consisting of 2.4 million and growing individual SID# plus multiple arrest images from
multiple arrests of the same individual.
MS.36 The Mugphoto system shall support record receipts and inserts at up to 1500 daily with a
peak performance of 250 per hour.
MS.37 The Mugphoto system shall support a normal workload of twenty (20) investigative (lineup) transactions per hour in addition to all other processing activities.
MS.38 The Mugphoto system shall be capable of processing a request, for the most current
photo image set from on-line storage (receipt of request at Mugphoto server to time
server starts to transmit to workstation) in a response time of 3 seconds or less.
MS.39 The Mugphoto system shall be capable of processing a request, for an index of all on-line
and archived photo records for an individual (receipt of request at Mugphoto server to
time server starts to transmit to workstation) in a response time of 3 seconds or less.
MS.40 The Mugphoto system shall be capable of processing a request, for a user-selected photo
record from on-line storage (receipt of request at Mugphoto server to time server starts to
transmit to workstation) in a response time of 3 seconds or less.
MS.41 The Mugphoto system shall be capable of processing a request, for the initial six (6)
images for a line-up in response to a parametric search inquiry of the on-line database
(receipt of request at Mugphoto server to time server starts to transmit to workstation),
with a response time of 10 seconds or less.
3.10
Data Retention
Maryland’s overall retention requirement for AFIS and Arrest information is ninety-nine (99)
years. Purges and expungements are ordered by the courts, and will require special user
authorization to perform the removal of records with a minimum of two levels of approval.
Standard user privileges shall not include the delete capability.
3.11
Project Management and Development
PM.1
The vendor shall provide resumes of all management team members assigned to this
contract. At a minimum, this will include: Project Sponsor, Project Manager,
Engineering Manager, Trainer, and System Design Engineer.
PM.2
The vendor shall outline the team approach to execute each phase of the project. The
following constitute the phases for this project: Planning, Design, Development,
Implementation (Testing, Training, Data Conversion, Installation, Transition), Systems
Operations and Support.
PM.3
The vendor shall ensure all sub-contractors are managed within the State approved
management process.
Nortel Government Solutions Incorporated
41
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
PM.4
The vendor shall be responsible for all requirements outlined in this document flowing
down to all sub-contractors involved in this project.
PM.5
The vendor shall use the Maryland DPSCS Project Management Office as the sole
interface to the State staff.
PM.6
The vendor shall ensure that all project activities shall be agreed upon by consultation
with the Maryland DPSCS Project Management Office.
PM.7
The vendor shall demonstrate industry standard project management methodologies. The
standard desired by the State of Maryland follows the Project Management Book of
Knowledge (PMBOK) methodology.
PM.8
The Vendor shall manage all work under this contract with a proven System
Development Life Cycle (SDLC) and approved by the State of Maryland.
PM.9
The vendor shall ensure all management plans and methodologies are driven down to all
sub-contractors. This will be documented and approved by the State of Maryland in the
Sub-contract Management Plan.
PM.10 The vendor shall provide a detailed project schedule as part of the Project Management
Plan. This schedule will not be deviated from without written approval from the State of
Maryland.
PM.11 The State of Maryland DPSCS shall provide on-site office space for up to five personnel
throughout the SDLC process.
PM.12 Project planning sessions shall begin within ten days of contract award.
PM.13 The vendor shall plan for the project planning sessions to be held at the Maryland DPSCS
facility. This will be coordinated with the Maryland DPSCS Project Manager.
PM.14 All documentation shall be delivered to the Maryland DPSCS in electronic format and
with a minimum of 5 bound hard copies.
PM.15 Office documents and/or reports shall be done using Microsoft Office 2000 or later (MS
Word, MS Excel, MS PowerPoint).
PM.16 Drawings and flowcharts shall be done using Microsoft Visio 2000 or later.
PM.17 Project schedules/plans shall be done using Microsoft Project 2000 or later.
PM.18 The vendor shall include all deliverables in the project schedule, with a Draft and Final
delivery date.
PM.19 The Project Management Plan shall at a minimum include: Project Description, Project
Development Strategy, Work Breakdown Structure, Project Schedule, Project Resources,
Acquisition Plan, Problem Resolution, Communication Plan, Standards, Security.
PM.21 The Project Schedule shall outline each key phase and associated deliverables.
Nortel Government Solutions Incorporated
42
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
PM.22 The Project Schedule shall outline all State assignments required to make the project
successful.
PM.23 The Communications Plan must outline weekly progress/status reporting.
PM.24 The Communications Plan must outline weekly progress/status meetings and meeting
minutes.
PM.25 The Communications Plan must outline all design review meetings and meeting minutes.
PM.26 The vendor shall not proceed with any activities in the Project Management Plan until the
Maryland DPSCS has approved the Project Management Plan.
PM.27 The vendor shall updated the Project Management Plan at each phase transition period
throughout the SDLC.
PM.28 The SEMP shall provide a top-level technical plan for the integration of all Maryland
state contracted systems.
PM.29 The SEMP at a minimum shall include: Detailed Scope definition, Contracted software,
hardware, Communications protocol information and System security and how it relates
to the engineering activities.
PM.30 The SEMP shall describe the management process necessary to ensure that all
components are fully compliant with all agreed upon requirements and standards.
PM.31 The Quality Assurance Plan shall outline the Quality Assurance methodology.
PM.32 The Quality Assurance Plan shall outline the Best Practices associated with implementing
a system of this magnitude.
PM.33 The Quality Assurance Plan shall outline the Procedures and tools that will be used to
ensure delivery of quality products to Maryland.
PM.34 The Quality Assurance Plan shall outline defined roles for the Maryland DPSCS relating
to the quality review of deliverables.
PM.35 The Sub-contract Management Plan shall flow down project requirements.
PM.36 The Sub-contract Management Plan shall flow down tools and procedures that will be
used to manage the sub-contractor(s).
PM.37 The Sub-contract Management Plan shall flow down approach to problem resolution.
PM.38 The Sub-contract Management Plan shall flow down corrective action approach for
missed deliverables.
PM.39 The Risk Management Plan shall describe the vendors approach to managing risk.
PM.40 The Risk Management Plan shall outline tools and procedures used to identify, assess,
mitigate and report risks throughout the project.
Nortel Government Solutions Incorporated
43
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
PM.41 The Risk Management Plan shall provide a risk priority assessment.
PM.42 The Requirements Traceability Matrix must support the development phases by
identifying the design document sections and software components that are associated
with each requirement.
PM.43 The Requirements Traceability Matrix must support the acceptance testing process by
identifying test cases associated with each requirement.
PM.44 The vendor shall prepare a Customer Factory Acceptance test plan to demonstrate each
component's compliance to the established requirements in the Requirements Traceability
Matrix.
PM.45 The vendor shall prepare a Unit Level Test Plan for each individual component
contracted. The test plan must outline each requirement in the Requirements Traceability
Matrix and the testing approach to verify compliance.
PM.46 The Vendor shall prepare an Integrated Systems Test Plan to outline each associated
requirement in the Requirements Traceability Matrix and the testing approach to verify
compliance.
PM.47 The Vendor must provide all internal testing documentation verifying quality control
within the organization prior to customer viewing.
PM.48 The Training Plan shall outline the objectives, needs strategy and curriculum to be
addressed during training for end users.
PM.49 The Training Plan will present the activities needed to support the development of
training materials, coordination of training schedules, reservation of personnel and
facilities, planning for training needs, and other training tasks that are necessary for the
implementation of the Replacement AFIS
PM.50 All training will be performed using both hands-on and document-based training
materials.
PM.51 Training documentation, at a minimum will include hardcopy user manuals, software
operational texts, and tutorial examples.
PM.52 To the extent possible, all such training materials should be made available to the State in
electronic format.
PM.53 The vendor shall grant the State permission to reproduce any and all training materials for
purposes of training State personnel on the proposed system.
PM.54 The Vendor shall coordinate the training schedules with the State 45 days prior to starting
any training.
PM.55 Training in MAFIS operations shall include all operating positions. Such positions shall
include Tenprint Operators, Quality Assurance Specialists, Latent Examiners,
Supervisors, System Administrators and support personnel.
Nortel Government Solutions Incorporated
44
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
PM.56 The vendor will be required to provide a transfer of knowledge regarding all technical
and administrative functions for the Transaction Controller, including, but not limited to
architecture, installation & configuration, security concepts, user definition and
maintenance.
PM.57 The vendor shall provide the following minimum numbers, outlined in Table 3.11.1 of
personnel/position training requirements upon system implementation.
PM.58 The vendor shall supply instructing personnel with training and experience on the
equipment supplied under these requirements, and all the necessary instructional
materials. All manuals, handouts, and other printed materials shall become the property
of the attendees.
PM.59 Where production data must be accessed, the vendor shall obtain prior approval from the
ITCD Project Authority.
PM.60 The vendor shall maintain a functional requirements document for the MAFIS
Replacement system, which includes the Transaction Controller, Fingerprint Archive,
Fast Identification and optional Mugphoto system.
PM.61 Vendor must support the required Minority Business Enterprise goals established for this
project.
PM.62 The Bidder must state in their proposal that they acknowledge that all Maryland photo
and fingerprint imaging data shall be the exclusive property of the State and that this data
will not be used for any purpose without the written permission of the State.
PM.63 Maryland criminal history and applicant information including friction ridge images may
not be transported outside the United States nor exposed to anyone other than State
approved vendor, contractor, or subcontractor personnel.
PM.64 There should be no substitution of vendor personnel named in the proposal without
permission from the State.
PM.65 The successful bidder's PM must have extensive background in the AFIS industry.
Table 3.11.1 Minimum Training Requirements
Section
AFIS
User Type
#of Personnel
Hours
Tenprint user
35
16
Tenprint
Supervisor
10
12
Tenprint
6
8
Latent User
30
16
Latent
Supervisor
10
8
Sys Admin
Latent
Nortel Government Solutions Incorporated
45
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
Latent
4
8
Archive User
40
4
Archive
Supervisor
15
8
Archive
6
8
Mugphoto
User
40
8
Mugphoto
Supervisor
15
8
Mugphoto
Sys Admin
6
8
Fast
20
4
Fast
Ident
Supervisor
5
8
Fast Ident Sys
Admin
6
8
TC
Supervisor
6
8
TC
System
Admin
4
8
Sys Admin
Archive
Sys Admin
Mugphoto
Fast
Identification
Transaction
Controller
4
Ident User
REQUIREMENTS TRACE ABILITY MATRIX
Not included
5
GLOSSARY
The following is a list of all acronyms used in this document.
ABS – Arrest Booking System
AFIS – Automated Fingerprint Identification System
ANSI – American National Standards Institute
CAR – Criminal Arrest Record
CCH –Computerized Criminal History System
CIRS – Centralized Image Repository System
Nortel Government Solutions Incorporated
46
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
CJIS CR – Criminal Justice Information System Central Repository
COTS – Commercial Off The Shelf
DPI – Dots Per Inch (printed resolution)
DOC – Division of Corrections
DPP – Division of Parole and Probation
DPS – Department of Juvenile Services
DPSCS – Maryland Department of Public Safety & Correctional Services
EFTS – Electronic Fingerprint Transmission Standard
FBI – Federal Bureau of Investigation
FDR – Fingerprint Data Router
GSP – Gateway Service Provider
IAFIS – Integrated Automated Fingerprint Identification System (FBI)
IQS – Image Quality Specifications
ITCD – Information Technology & Communications Division
III – Interstate Identification Index
IPS – Identification Processing System
JDBC – Java Database Connectivity
LAN – Local Area Network
Lights Out - System processing that determines identification of an individual without manual or
human intervention.
MAFIS – Maryland Automated Fingerprint Identification System
MSP – Maryland State Police
NFF – National Fingerprint File
NIST – National Institute of Standards and Technology
NLS – Network Livescan System
NOVARIS – Northern Virginia Regional Identification System
ODBC – Open Database Connectivity
ORI – Originating Agency Identifier
PCN – Process Control Number
PPI – Pixels Per Inch (digital resolution)
RAFIS – Regional Automated Fingerprint Identification System
RAP – Report of Arrest and Prosecution
RAS – Repository Administrative System
RDBMS – Relational Database Management System
SAN – Storage Area Network
Nortel Government Solutions Incorporated
47
January 23, 2006
Functional Requirements Document (Final)
Version 2.0
SRE – Submission Result – Electronic
SDLC – System Development Lifecycle
SID – State Identification Number
TP/TPID – Tenprint to Tenprint Identification
TDB – Temporary Database
TOT - Type Of Transaction
ULW – Universal Latent Workstation
VPN – Virtual Private Network
WAN – Wide Area Network
WSQ – Wavelet Scalar Quantization (image compression standard)
Nortel Government Solutions Incorporated
48
January 23, 2006
Download