BSC Biometric Security System

Slides:



Advertisements
Similar presentations
ACCU-DART & Sage 300 ERP SHIPPING BY SMARTLINC
Advertisements

Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Beach Park Schools Beach Park, Illinois Introduces.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
By: Monika Achury and Shuchita Singh
PALM VEIN TECHNOLOGY.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Biometrics Part 2  Access Control 1.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Information about Biometrics and its security By Ridham Bhatt.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Biometrics Authentication Technology
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
A NEW THEME FOR THEME PARKS COMPANY : ID LINK. MISSION STATEMENT In all the ways we scan, save, and serve. Will it ensure honesty? Promote safety and.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Software. Because databases can get very big, it is important to decide exactly what is going to be stored in each field. Fields can be text, number,
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Aladdin Security We supply what others can only assure.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
DATA TYPES.
Immigration – Common Errors and How To Conduct An Internal I-9 Audit
Creating your online identity
DATA COLLECTION Data Collection Data Verification and Validation.
Black Ice Security Services
FACE RECOGNITION TECHNOLOGY
Stovall and Klee Security
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Biometric Security Palm Vein Technology
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
Meghan Mumpower, Lucas McDuff, and Zach Biggers
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
Databases Software This icon indicates the slide contains activities created in Flash. These activities are not editable. For more detailed instructions,
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Mother Baby Security By: Lynzy Swartz, Grace Broughton,
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Campbell’s Security Co. ™
Checkbook Project Intro and Setup.
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BSC Biometric Security System Motto – Bringing safety and peace of mind to your life. Project by Joseph Parrish, Alysa Chirillo, Jody Baker, and Ryan Williams

Security Plan The plan that we propose is to station palm vein scanners at each entrance and exit of the amusement park. Palm vein scanners are inexpensive, quick, and accurate. It is also nearly impossible to “trick” a palm vein scanner. This system would be equally effective for both large and small amusement parks, due to the low cost, and high reliability.

The Science Behind the System The scanner uses near-infrared light to capture an image of the vein structure in a persons hand. The hemoglobin in the blood absorbs the light, so the veins appear black in color The software for palm vein scanners creates a reference template based on the structure of an individuals veins, and stores the template for future reference.

Everyday Use People entering the park would have to give their name, pay for their day at the park, and get their hand scanned. This would allow an amusement park to keep an organized record of everyone who entered the park on a certain day. When people exited the park, their hand would be scanned again, and ID would be asked for the match the name. This would make sure no one had bypassed the entrance system. Anyone caught sneaking in would be fined.

Benefits of the System People who needed to exit the park, to go to a car for example, could simply scan their hand, and get back into the park. Season pass owners, could use the same method, plus, they wouldn’t have to wait in the long entry line. There is only a false rejection rate of 0.01%, and those who have the error need only to rescan their hand. Another thing is that the false acceptation rate is 0.00008% Scanners can be used as an attraction, because the images can be sold. Who wouldn’t want to see the vein print in their hand? Even identical twins have different images. Age of the individual does not usually inhibit the scanners rate of accuracy. Reassurance: a sole hand vein scan is useless without more personal information, or access to a private database containing hand vein scans similar to ones taken at the park.

Limitations The same hand must be scanned every time or the scan will simply not work. People with missing arms or hands would have to do things the old fashioned way, such as picture ID, or a printed ticket.

Privacy Issues Because hand vein scans are so accurate, people may be concerned about their privacy. It is recommended that these images are only matched with a name, and park status, such as valid ticket, expired ticket, season passes, etc. This addresses the issue because to match just a name and a scan, people with identical names, would have to be physically rescanned. The database of scans can be purged on a regular basis to ensure that, should the system be compromised, limited data could be stolen.

Success Stories Banks in Japan have been using this technology at ATM’s for more than 5 years to identify people with no real complaints. Disney parks have been using fingerprint scanners since around 2006 with a high success rate.