By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard

Slides:



Advertisements
Similar presentations
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Advertisements

By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Security, Privacy, and Ethics Online Computer Crimes.
By: Monika Achury and Shuchita Singh
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
Biometrics: Voice Recognition
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
BIOMETRICS.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Topic 5: Basic Security.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Networking Network Classification, by there: 3 Security And Communications software.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Computer Security Set of slides 8 Dr Alexei Vernitski.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Information Systems Design and Development Security Precautions Computing Science.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Biometrics in the Banking Industry
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
Biometrics Security in Banking Systems Image processing in ATM
Protecting Your Assets By Preventing Identity Theft
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Facebook privacy policy
Take Charge of your Finances
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
3.6 Fundamentals of cyber security
A Seminar Report On Face Recognition Technology
Take Charge of your Finances
Stovall and Klee Security
Biometrics.
Regulation of Investigatory Powers Act 2000
Project Overview Visit Now:
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Winnetka Police Department
Chapter 10 Consumer Education.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Biometrics.
Cybersecurity and Personal Finance
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Protecting Your Identity
Discover the Boom in Electronic Banking!
Take Charge of your Finances
G061 - Network Security.
BY: Michael Etse and Maverick Fermill
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard Voice Box® Voice recognition Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard

What is Biometrics? Biometrics is the process by which a person's unique physical traits are detected and recorded by an electronic device or system as a means of confirming identity. These recorded traits include, but do not fully consist of: Fingerprints Eye Retinas and Irises Voice Patterns Facial Patterns Hand Measurements

Voice recognition: The need According to criminalfraud.com, bank fraud is a whopping 1 BILLION dollar industry in North America. Once a thief obtains the login and contact information, the effects could be extremely detrimental Thieves can clean out your account, open other accounts with your stolen information, and commit other banking crimes in your name (Lifelock). Voice recognition is an encouraging invention that can eliminate bank fraud.

Downloadable Software The Voice Box® Scanning Device The Voice Box is a small device, roughly the size of an apple, that attaches to bank computers and ATMs. The device records the voice of the costumer as they speak and matches it to the pre-recorded voice that is stored in the database. Downloadable Software The software checks whether it is the same voice as the costumer. If it is, the program allows the transaction to go through. If not, the program alerts bank employees and cancels any transactions. Database The Database will be located in the bank headquarters and will be located in a secure room. It will store voice recordings of costumers. The Voice Box is a revolutionary invention. It works with 3 components:

the VOICE box® New Costumers: When an individual is enrolled, the device records samples of the person’s speech as the costumer says some scripted information. This recording is converted to a digital format that can be stored in the database. The recording requires very little of the costumer’s time and isn’t a big intrusion. Returning Costumers When a costumer calls over the phone, the device matches the voice to the costumer’s recording in the database. On an ATM, the device is connected to the bank’s network and is able to access the database for the recordings to verify the costumer.

The Voice Box® Voice Box Specs: Cost: Roughly $1,000. Price includes installation and technical support. Usage: The Voice Box is adaptable for all banks, large or small. Upkeep: The Voice Box company will provide technical support free of charge and will send technicians to the bank. Reliability: The Voice Box software is bug-proof and the device has been tested in many scenarios.

Pros & Cons Advantages Costumers who cannot write or see will be able to perform tasks they wouldn’t otherwise be able to do easily. Staff trained in different languages is not needed as much. Good for costumers who have problems reading and/or writing. Can be used by people who don’t have use of their limbs. Little, if any, training is required to use it. Less paper will be used. Disadvantages It can’t be used by someone who is mute or has a speech impediment. Might not work as well for people with heavy accents or other things that make it hard for the program to understand what the user is saying. The biggest disadvantage with the technology is that it does not work well in noisy environments (like points of entry).

Privacy Speaker recognition would not cause any issues for privacy. Quite the contrary, it would give people privacy back, allowing them to only use their PIN number as a last resort, and instead relying on their voice, something that everybody already hears. The recording are saved in a software database. This does make it vulnerable to hackers. Voice recognition technology requires minimal training for those involved. It is also fairly inexpensive and is very non-intrusive for the costumer. The biggest disadvantage with the technology is that it can be unreliable and does not work well in noisy environments (like points of entry).

Beating Voice Box® All tests have shown that speaker recognition is completely reliable and cannot be passed by identity thief. Also, if hackers do acquire your information they still won't have access to your account because they can't pass the voice recognition. The voice box has a pass phrase for gunpoint incidents

Voice box: success! Mason Clark enjoys the simple security of Voice Box®. When he bought the product, he had the initial reaction of: Why? BECAUSE HIS INFORMATION IS BEING KEPT SAFE IN A SIMPLE AND UNDERSTANDABLE WAY It’s madness. When he found out that others don’t use the same authentication device as him, well, this explains it: He enjoys Voice Box® so much he took pictures to prove it! KUDOS TO MASON FOR CHOOSING THE RIGHT AUTHENICATION DEVICE. HIS MONEY IS SAFER THAN YOURS.

Sources Bank Fraud. (n.d.). Retrieved September 8, 2014, from http://www.lifelock.com/education/identity-theft-recovery/bank-fraud/ Fraud Against Financial Institutions. (n.d.). Retrieved September 8, 2014, from http://www.criminalfraud.com/bank-fraud.php