The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
ET3100 BioFlex TimeClock. What is fingerprint scanning?  It is a pattern acquisition and recognition established on a person’s.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Author: Austin Kamrath Wednesday April 12th, 2017
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
X7– Fingerprint Access Control terminal
Presentation transcript:

The solution is at your fingertips!

BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in the world. Fingerprint based systems Facial Recognition systems Passport / document authentication systems

Possession Knowledge PersonalCharacteristics A New Class of Identification

“The science of using measurable physical characteristics or personal traits to recognise the identity or verify the claimed identity of a person through automated means” “The science of using measurable physical characteristics or personal traits to recognise the identity or verify the claimed identity of a person through automated means” What is BIOMETRICS?

The Physiological Biometrics are: DNA Eye Retinal Pattern Iris Pattern Facial Recognition Hand Geometry Fingerprint

The Behavioural Biometrics are: Voice Recognition/Verification Handwriting Verification Keystroke Dynamics

Enrolment Every biometric verification starts with an enrolment, which is: Choice of a PIN 1st Presentation of Finger (2nd to 5th Presentation of Finger) Test

Enrolment : How the fingerprint is read Light source Platen Camera Finger Optical sensor Lens

Finger Semiconductor substrate Capturing methods: - capacitive- moving - thermal- still - pressure Enrolment : How the fingerprint is read Semiconductor sensor

Comparison of sensors precise, high resolution insensitive cheaper resolution limited static electricity more expensive Optical Semiconductor

Enrolment: How the template is formed ? Pattern matching

Minutiae matching Enrolment: How the template is formed ? x x x x x x x x x x x x x

Comparison of algorithms Pattern matching Very precise: Quick (0,5 sec) Position sensitive (  5°) Minutiae matching Less precise: max Less quick (1 sec) Not sensitive to position(180°)

The Enrolment Process Sensor 150 kByte 12 kByte 1.2 kB 0.4 kB Digital grey scale image Binaryimage Biometrictemplate Quality level Localdatabase Networkinterface Image processing module 1st scan (evt. 2nd - 5th scan Modifications)

The Verification Process Sensor 150 kByte 1.2 kB 0.4 kB Quality level Localdatabase Networkinterface Image processing module one scan Comparison Live finger test analysis Result RelaysInterface Keypad Interface Verification required

Identification Sensor 150 kByte Quality level Localdatabase Networkinterface Image processing module One scan Search/Comparison Result RelaysInterface Identification required 0.4 kB

Security Two characteristic values: False Acceptance Rate (FAR) < % (1 in 1 Million) False Rejection Rate (FRR) ~ 1% at first try

Major Applications Access Control Time & Attendance / Payroll Computer Network Access Transaction-Based Management & Tracking Other Applications

Access Control & Management Fast, Simple & User-Friendly System Sophisticated - Can Restrict By Area & Time Inexpensive - No “On-Costs” Of System Inherently Secure - No Unauthorised Access Full Audit Trail No Productivity Loss ie. Lost / Damaged Cards

Time & Attendance / Payroll Eliminates “Buddy Punching” & Ghost Employees Easily Interfaced To Payroll Software Can Be Used For Job-Costing & Task Allocation High Levels Of User Acceptance / Union Approval

Computer Network Access Management Eliminates Need For Cards, Codes & Passwords Eliminates Need For Cards, Codes & Passwords Can Be Provided With “Tailored Access” Software Can Be Provided With “Tailored Access” Software Fast & Secure - No Lengthy Access Routines Required Fast & Secure - No Lengthy Access Routines Required Protects An Organisation’s Most Important Assets From Unauthorised Access Protects An Organisation’s Most Important Assets From Unauthorised Access

Transaction-Based Management & Tracking Accurately Records Activities & Identifies Individuals Involved Can Be Configured To BarCode Readers Increases Employee Responsibility Lowers Incidence Of Unauthorised & Unproductive Behaviour

Other applications Corrective Services Remand/Home Detention Immigration & Passport Control Smart Card Integration E.F.T & Payroll Transactions Enhanced Security for Existing Card Systems Parliament voting systems

What is the best solution for... Time and Attendance Payroll Systems? Access control and Management systems? Transaction-Based Management & Tracking?

Fingerscan V20 THE SOLUTION

Typical V20 Installation Lobby PC CafeteriaBack West East RS 485 network 2m Max. 3 Km. (RJ485)

Fingerlan Network Software Turnkey Network Software for the V20 rapid start-up of V20 in networked applications Allows on-line inquiry - who went where, when

BARTEX 2000 Corp. In addition to the Fingerscan V20, BARTEX 2000 Corporation offers You the full line of Identix fingerprint technology products as per the following three slides. BARTEX also has full AFIS based fingerprint systems for police and government use. Contact:

Fingerscan V20 Products (1)

Applications of DFR-200 Products (2)

Application of DFR-300 Products (3)

2.0 Server for Windows®: Enterprise Network Security 2.0 Client: stand-alone or network logon Client: add smart card to BioLogon™ Client : encrypt/decrypt data with your finger : password bank & application locking SDK : integrate BioLogon™ with other applications Software for PCs

Identix Inc. The company  Shares registered at American Stock Exchange  19 years in fingerprint business  Located in Silicon Valley, California.  Present growth 30-40% per annum  Revenue /96 $37 Mio, 1996/97 $52 Mio, 1997/98 $79 Mio.  Worldwide biometric marketshare more than 60%.  Identix is the first company to launch 4th and 5th generation products  Contact