Beach Park Schools Beach Park, Illinois Introduces.

Slides:



Advertisements
Similar presentations
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Morpho Introduction  40 years of focused world-class experience  World’s largest install base  Most industries & toughest environments  Consistently.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
“More than 700 schools now our fingerprint scanners in canteens or libraries, or to register pupils.” “Biometric systems currently.
THE FINGERPRINT  The reader acquires the fingerprint image.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
The Role of Computers in Surveillance ~ Katie Hatland.
Biometric Daily Time Record
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Automatic Fingerprint Identification System Purpose Fingerprinting Process Applications Cost Issues Future National ID Card.
Biometric Identification SecurityCafeteria AdmissionsNurse Time & Attendance Raymond Jay Fry, Ed.D. President, CEO & Co-Founder identiMetrics, Inc. Copyright.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Group #18 Biometric Padlock. The Biometric Padlock Team Jim Turner Jerry Guzolik Sasant Nuthakki Blaise Kapombe Nathan Harris.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
Biometrics.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Before finger scanning The school was using meal tickets with bar codes and ID numbers to identify the students at lunch time. The card and number system.
BIOMETRICS.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Management Information Systems & School Registration 1.
BIOPARK DISABLED PARKING FRAUD BIOMETRIC SOLUTION BY LIDROR
Athina Antoniou and Lilian Mitrou
Summary Physical Access & Time and Attendance PC/Network Access
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
BSC Biometric Security System
Welcome To Money pad November 23, 2018 Sample footer.
BSC Biometric Security System
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Hybrid Finger print recognition
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Digital Photograph Solution
Recorder Visual Identification Test
15-5 Automated Fingerprint Identification System
Presentation transcript:

Beach Park Schools Beach Park, Illinois Introduces

Biometric Identification SecurityCafeteria AdmissionsNurse Time & Attendance

Where everyone knew your name…

Can anyone know your name?

School Identification Challenges Attendance Security Nurse’s Office Cafeteria Bus Library Systems

What are we doing today?  Identification Cards/Bar Codes  Forgotten, lost, stolen, mutilated  High life cycle costs  Visual Identification  Not practical  Too many staff substitutions  Personal Identification Numbers (PIN)  Not practical for young students  Easily forgotten or stolen

The Solution  Biometric Fingerprint Identification Well accepted & accurate Easily mastered Quick adaptation 70% of consumers worldwide support biometrics You can’t get much simpler than a fingerprint!

Biometric Finger Scanning Finger is scanned The original finger-scan image is discarded. It is impossible to recreate the fingerprint from this data Unique points are identified Points transferred to a binary number Number is encrypted and equals the student’s ID number Privacy is insured!

Differences Between Student Identification Software and Law Enforcement Applications Student Identification Software Law Enforcement Applications Uses flat images of only two fingers to create digital templates of minutia Captures rolled images of all 10 fingers Flat images reveal the center of the finger and require only a minimum of unique identifying points in order to make a match Rolled images capture unique identifying points on the entire finger surface in order to collect the maximum number of unique identifying points The purpose is to identify a student already enrolled in the software The purpose is to identify suspects based on fingerprint images directly taken from a crime scene Student ID vs Law Enforcement

STUDENT IDENTIFICATION PLATFORM Attendance Security Nurse’s Office Cafeteria Bus Library Systems

Visitation BVM Elementary School Daily Attendance/Meal Count

Wood County Public Schools Cafeteria Point of Sale Library Check Out

Other Applications - Not Just for Food Services  Library  Remote Identification - PDA  Dances/After School Events  Sports Events  Bus Transportation  Schools continue to find new ways to use the technology!

Summary  Well Accepted  Easily Mastered  Quick Adaptation  Elimination of Cards, PINs, Barcodes  Accurate & Auditable Records  Never Forget Your ID!

Biometric Identification SecurityCafeteria AdmissionsNurse Time & Attendance

FOR MORE INFORMATION GO TO: A brochure is included in your registration packet. Thank you for your attention.