Michael Barrett Founder Nok Nok Labs Camera Fingerprint Sensor Microphone Secure Execution Secure Storage Location Motion, Heartbeat, etc. M7 Face.

Slides:



Advertisements
Similar presentations
HOME APPLIANCE CONTROL SYSTEM HOME APPLIANCE CONTROL SYSTEM Kunal Patel Arun Immaneni Saurabh Kapoor Meghna Atluri Akila Muthuveeraganapathy.
Advertisements

Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Fast IDentity Online – a new industry alliance formed to develop technical standards that enable Internet Services to use Simpler Stronger Auth solutions.
VoIP alarm monitoring. Traditional alarm systems Motion sensor Smoke detector Camera Premise Controll Unit Fire station Security service Central station.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Amdocs Unified Communications solution.
RAPID Robotic Arm empowering People wIth Disabilities Contact person: Market: Assistive.
BIOMETRICS Presented By Rickie Jackson.  Outline –Introduction –Biometrics techniques –Strengths, and weaknesses –FAR/FRR –Major Players –Summary.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Group member: WET Xu Peiwen WET Zulifeiya.Julaiti WET Lum Ken Iu WET Wee See Yee.
Microsoft Ignite /16/2017 4:55 PM
One App for All Coding for different iOS variants Mike Oliver iOS Team Lead
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Background Background Problem domain Current situation Proposed solution System architecture Functional requirements Non-functional requirements Major.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Centralized Platform for Mobile Device Management and VoIP.
HACS HOME IN YOUR POCKET. Today’s Topic User Interaction User Interaction User Authentication User Authentication Database Database Design of Devices.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
LastLeaf Sample PPT SMARTEST WAY TO CRAFT PRESENTATIONS.
Karthiknathan Srinivasan Sanchit Aggarwal
Deb Gearhart Trot University Student Authentication – What it Means for Us.
Metadata in the Cloud Computing 07th June 2012 Baba Piprani Ewelina Szczekocka.
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
Living in a Digital World GCSE ICT Unit 1. What are we going to study?
Larry Shi Computer Science Department Graduate Research Mini Talk.
Why FIDO Matters? Healthcare Tom Groom CEO October 5th, 2015 Confidential.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
BIOMETRICS THE MAN MACHINE INTERFACE
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Windows 10 & Office 2016 Presented By: Cody Pierson & Patrick Wall.
APP308. Scenario Use fingerprints instead of passwords to authenticate. Scan barcodes and read magnetic stripes. Use Geofence enter/exit to.
Makes Accessing Virtual Apps and Desktops from Any Device as easy as turning on your TV Citrix Receiver.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Cosc 4735 Primer: Marshmallow Changes and new APIs in android 6.0 (api 23)
1 Requirement Specification for IoT API layer Company:Tata Consultancy Services Author(s):Avik Ghose Contact
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
 Shut off unused lights  Shut off unused electronics  Turn on fans to lower A/C usage.
Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
An Introduction to Biometrics
Modern User and Device Authentication  Biometric Fingerprints: Moving beyond Login  TPM Key Attestation: Binding a user and machine identities  Strong.
By Hello Team Awesome World™.  To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based.
Identity Standards Architect, Microsoft
WEB IVR SMS WAP USSD One Picture to Understand USDP What is USDP … …
Applying Cryptography to Physical Security
IT Security Goes Organic
Cisco Unity Connection 2.0 Phone View Configuration
ESTHER BENJAMIN.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Windows Hello Sam Chang Senior Program Manager WinHEC 2015
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Human–computer interfaces
Taewan kang, Kevin huangfu
Mentors: Christine Lisetti and Ugan Yasavur
Authentication by Passwords
Specialist hardware devices for physically disabled users
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
This is a typical Windows user desktop
Invisible Computing Angie, Collin, Nick, Will.
k:info Smart Billboards for Informal Public Spaces
Face Detection Gender Recognition 1 1 (19) 1 (1)
COEN 351 Authentication.
Interactive Mirror Display
BY: Michael Etse and Maverick Fermill
Hitachi Storage Service Manager GUI Navigation Overview
Presentation transcript:

Michael Barrett Founder Nok Nok Labs

Camera Fingerprint Sensor Microphone Secure Execution Secure Storage Location Motion, Heartbeat, etc. M7 Face Recognition Fingerprint Recognition Voice Recognition

App 2 App 1 New App Unified Authentication Protocol ? Applications Authentication Methods

USERS SIMPLICITY EASY TO USE ANY DEVICE NO PASSWORDS ORGANIZATIONS SECURITY ANY AUTHENTICATOR UNIFIED INTERFACE EXPAND, NOT REPLACE ECOSYSTEMS FLEXIBILITY SECURITY = DEFAULT AGILITY FUTURE-PROOF