Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.

Slides:



Advertisements
Similar presentations
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
Advertisements

Confidential Iris Authenticati on System Optics and Digital System.
Lecture 6 User Authentication (cont)
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
By: Monika Achury and Shuchita Singh
Information Security Policies Larry Conrad September 29, 2009.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
Progress Report 11/1/01 Matt Bridges. Overview Data collection and analysis tool for web site traffic Lets website administrators know who is on their.
KBA 1 Korea’s Advances in Biometrics Market & Technology Alex H. Choi Korea Biometric Association.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Identification System Purpose Fingerprinting Process Applications Cost Issues Future National ID Card.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
WELCOME.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Authentication Technology
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Biometrics.
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
IRIS RECOGNITION SYSTEM
PRESENTATION ON BIOMETRICS
Biometric Technologies
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Retinal & Iris Scanners
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
影像辨識技術 Image Recognition Technology 吳宗益. Professor Tsung-Yi Wu ( 吳宗益 ) Home Page:
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
how to prevent them from being successful
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
SECURITY in IT ~Shikhar Agarwal.
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
Biometric Security Palm Vein Technology
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Ones Technology Products & Solutions
Presentation transcript:

Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive Sensitive Palm Vein Non-invasive Relatively Cheap Accurate Unfamiliar 2 source

 There are two methods of photographing veins:  Reflection method  Transmission method Fujitsu employs reflection method

Takes snapshot of palm veins Converts into algorithm Compares with database 4 HOW IT WORKS

USER INTERFACE  CONTACTLESS  NON-INVASIVE  LOW RECOGNITION SPEED

DATA FLOW 6

VISIBLE RAY IMAGE INFRARED RAY IMAGE EXRACTED VIEW PATTERN

 Administrative Impact  Reduces, prevents sensitive financial information breach  Prevents law suits  Discourages workplace fraud  Easy to implemented, fast to train  Portability provide off-site access  Without sacrifice security  Increases Productivity  Reduces password loss  Reduces the need of Technical Help Desk

PRACTICAL APPLICATIONS ATM MOUSE PORTABLE MOUSE

Summary  In comparison with other leading bio-tech, PalmSecure is  More Reliable, More Accurate  Fast  Small  Relatively cheap to implemented and operate  It can be use for  PC log-in  Building entrance  ATM machine, etc…  Protect sensitive financial information  Reduce loss due to identity theft 10

THANK YOU

QUERIES