Max, Abbie, Kalen, and Cassie Members of B.U.N.S.

Slides:



Advertisements
Similar presentations
HAVE YOUR PHOTOS DIGITIZED PCNA: GET YOUR OLD PHOTOS CONVERTED TO A DIGITAL FORMAT FOR YOU.
Advertisements

What Are the Functions of ATM Machines?
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
CUTTING EDGE TECHNOLOGIES. MADE BY : MAHA SAHER ALI (PROCTOR) CLASS: XI ISLAMABAD COLLAGE FOR GIRLS F-6/2 ISLAMABAD.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
 You will need to be able to Explain the limitations of using ICT in society today and how advances in technology may overcome some of those limitations.
You Want Me To Do What? Part 2 Presented by Keystone Computer Concepts
WHAT IS A COMPUTER? BY JACK SUMMERS. WHAT IS A COMPUTER? A computer basically a set of different components that when put together in the correct way.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
How to Install Windows 7.
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
= Home Button. This is a portable memory device. It can hold from around 32Mb up to 256GB. These are sometimes called ‘Flash Drives’ and they are universal,
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Buying and Selling Items on eBay and Craig’s List Computer and Technology Group May 15, 2008.
Introduction to Computers Connie Dalrymple. What is a computer? Sources:
Unit 30 P1 – Hardware & Software Required For Use In Digital Graphics
Cursive Cursor ™ We read things So you don’t have to.
© Oklahoma State Department of Education. All rights reserved.1 Credit Cards: More Than Plastic Standard 8. 1 Credit Cards and Online Shopping.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
TouchIT Board Training.
… but what parts does it have and how do they work? A computer looks like this...
Input Devices Manual and Automatic By Laura and Gracie.
© Take Charge Today – August 2013 – Understanding Credit Cards – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School of Family.
Plan Design Analyze Develop Test Implement Maintain Systems Development Life Cycle MCC Designs Meghan Perea Carrie Ver Burg Cory Schroeder.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
1 Interacting with your computer Chapter 3 Mailto: Web :
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Compound Interest ©Dr. B. C. Paul 2001 revisions 2008, 2011 Note – The subject covered in these slides is considered to be “common knowledge” to those.
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
2.00 Understand Computer Fundamentals
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Explore the Parts of a Computer Inner Parts Outer Parts.
Information Processing Content covered  Data and information  Information Qualities  Data/Information Processing  Commercial Information Processing.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
A NEW THEME FOR THEME PARKS COMPANY : ID LINK. MISSION STATEMENT In all the ways we scan, save, and serve. Will it ensure honesty? Promote safety and.
Mr. Stasa © You should be able to:  Identify the different parts of a personal check  Complete a personal check  Endorse.
How Your Customers Will Pay Online & by Phone
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
By: Danielle, Laine, Taylor, & Celeste. Mission Statement “Linking mothers and fathers to their babies through a safe and time- efficient manner.” Objectives:
Connect hardware safely to a computer system, test functionally - P5 By Ridjauhn Ryan.
 Atwood-Hammond High School.  You are given access to the school’s computer network as a privilege, not a right.  Any work done using your school account.
Physical Security Concerns for LAN Management By: Derek McQuillen.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Unit 7 P2 P2 explain potential risks to consider when installing
Lesson 4 Alternative Methods Of Input.
Outline The basic authentication problem
Standard Methods of Input.
Print Out Text Messages from Android Phone Mac/Win
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Lesson 4 Alternative Methods Of Input.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
BSC Biometric Security System
BSC Biometric Security System
ICT Programming Lesson 2:
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Internet Safety – Social Media
K.C.C.A. : Key Crime Ceasing Association
The Computer’s Hardware
Chapter 1: Introduction to Computers and Programming
Presentation transcript:

Max, Abbie, Kalen, and Cassie Members of B.U.N.S

  B- Biometric’s  U- Ultimate  N- New  S- Security B.U.N.S

  F-Fingerprint  O-Optical  O-Online  D-Device F.O.O.D

  Our mission is to create a safe and cost-effective way to prevent people from using someone else’s admission pass into H.A.M:)  (Have A Moment Amusement Park) Our Mission

  F.O.O.D uses optical fingerprinting connected to a USB to safely identify the user while allowing them admittance to H.A.M.  By scanning their fingerprint, and giving the “Go” code, the USB will light up green when it’s user entered it’s fingerprint correctly and it’s connected to a computer. Security Outline

  Optical Fingerprint scanners are really easy to understand. They read the light input from the sensor pixel by pixel, the ridges being darker and the valleys being lighter. This is coded into electrical signals that match up with the information already stored. The Science Behind It

  USB’s work on the electrical memory that computers use. The memory is stored in electrical signals that travel back and forth between them. The light from the Optical sensor reads the information and then will send that information in “Computer Language” through electrical signals in the USB. The computer reads this information and then checks if it is the same as the information stored on the computer. The Science Behind It

  The flash drive is activated by the correct thumbprint, causing the LED lights to turn green. When F.O.O.D. is plugged into the park’s computer system, all the person’s or family’s information that was entered when ordered online or when purchased at the park is available. When entering the park, the USB must be activated and plugged into the park’s computer system in order to allow admission. If credit card information is included in F.O.O.D., payments can be made for concessions or park admission by inserting the drive into the computer and clicking on the “Pay with Card” option. How the System Works

  Food comes with a necklace but can be shortened so it can be worn as a bracelet or anklet.  Food is just a slightly larger version of a flash drive.  It lights up different colors depending on how you customize it.  You can make it light up one color if it recognizes the finger print and light up a different color if it doesn’t.  You can also make it flash random colors during the day just so you look cool.  The cover surrounding the scanner is water proof and it comes with covers for where you plug into a computer and the scanner itself. Design

  Limitations may include people that have wet hands would not have their fingerprint read properly. The light would hit the water and reflect in a way that would prevent the ridges and valleys to be seen.  Pruning of the fingers would distort the fingerprint in a way that would make the ridges and valleys further apart from each other and unlike the fingerprint that they had originally put into the system.  To solve both of these problems, people would simply have to dry their hands off before use or wait for their hands to go back to normal before use. Limitations

  Another limitation to this product is the fact that some people may find this to be a privacy issue with having the credit card information, address, and phone number on their USB.  They may also be concerned with the fact of their fingerprints being used and stored in a computer.  This wouldn’t be a problem considering that the data would be stored on a separate program from the rest of the system. It would also be protected with passwords. Privacy

 We have already installed F.O.O.D into Holiday World and it has worked wonderfully. There was little change that had to be made to the park and installation costs were minimum. Holiday World has reported and increase of tickets sales because of the fact that people cant share admission tickets. Success Story

  The normal plan for just one person is 50 dollars plus admission for that day (unless you purchase a season pass)  There is also the option for a family plan where instead of having one scanner for each person there would be one scanner for the whole family  The extra cost would be 20 dollars per person  You can add a person by going into the settings area on the computer and click add a family member Family Plan

  Beating the system would include having to take a thumbprint of someone using putty and hold it up to the scanner. Yet, this may turn difficult to do considering there would be people at each stall watching and there are cameras placed strategically around parks already. Beating the System

 Invest in F.O.O.D. TODAY!