Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
Security-Authentication
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Information about Biometrics and its security By Ridham Bhatt.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes.
BIOMETRICS.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Black Ice Security Services
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Biometric Security Palm Vein Technology
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
Seminar Presentation on Biometrics
BSC Biometric Security System
Margaret Brown 3rd period October 14, 2007
BSC Biometric Security System
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable security will promote more clientele.

What is a hand sensor?  A hand sensor is a form of visual/spatial biometrics that calculates the blood flow and ridges in the skin.  The hand sensor measures the size, shape, veins, and ridges in the hand.  Around 90 measurements are taken (length, width, height, etc.) of your veins and the size of your hand.

Why hand sensor?  The measurements can also scan your hand even if you have dryness, roughness, moisture, or scarring, which makes the biometric accuracy near 100%.  This form of biometrics is very friendly to users because of its accuracy and system reliability.  $330

Hand Print Success Story  After the rape of a 12 year old girl, an examiner lifted a palm print from a glass table. Using biometric technology, the detective was able to match the hand print with one already found in the system. The King County Sheriff’s Office and Shoreline Police Department quickly arrested the suspect within a few days of the crime. He was charged with Rape First Degree and Burglary First Degree with Sexual Motivation.

Voice Recognition for Phone Servicing  This will allow users to verify their account over the phone using their voices.  If speaker claims to be a certain identity, the voice is used to verify its claim.

What is Voice Recognition?  This uses the voice to determine the identity of the speaker  Relies on features  Physical structure of individual’s vocal tract  Individual’s behavioral characteristics  Different than “speech recognition”  Recognizes words as they are said

Why Voice Recognition?  Analyzes for hundreds of characteristics and compared to the voiceprint on file  99% accuracy  Higher if speaker says a predetermined passphrase  Telephone banking  $1,000

Limitations to Voice Recognition  Condition of customer  Sick  Quality of call

Success Story  Banking firm introduced voice recognition to over 12 million customers earlier this year. They had customers choose an unusual passphrase that they wouldn’t normally say in everyday conversations. There has been no breaks in the system so far.

Psyching the System  Ear Structure- Cutting someone’s ear off would psych the system, but it’s unrealistic. Photos could be used, but security cameras and name requirements will prevent this from happening.  Voice Recognition- High tech recording devices could replicate a voice but adding a specific passphrase would help prevent theft.

Psyching the System Continued  Hand & Fingerprint- Removal of the hand/finger would allow access. Also, using a special gel to capture fingerprints could break the system which is why Biome-No-Trics uses 2 finger print access.  Vein scanning- There is no known way to beat the system in vein scanning. It tracks the blood flow in your hand. By cutting off the hand, you would eliminate the flow of blood and therefore eliminate your chance of breaking into the system.

Privacy Policy  We know many of your financial institution is concerned about biometrics for a number of reasons: time, personal information, security and identity theft.  Biome-No-Trics can assure you that all four devices will be tailored to you and only you in just 45 minutes. This includes setup, takedown, background information, and full security coverage.  We can also promise you that this information will not leave Biome-No-Trics database as we have state-of-the-art computer enhanced biometric code scrambling to secure your investments. Our database is untraceable, unhackable, and delivers the ultimate in security. Also, we don’t submit these scans to police unless they provide a subpoena.

Works Cited  Agnito. (nd). Voice ID. [accessed 7 September 2015]. Retrieved from: corp.com/resources/faqs/technology/how-accurate-voice-biometric-technology  Biometrics Institute. (nd). Types of Biometrics. [accessed 7 September 2015]. Retrieved from:  Dave Mosher. (2010). Wired. [accessed 7 September 2015]. Retrieved from:  Elizabeth Weise. (2011). ScienceFair. [accessed 7 September 2015]. Retrieved from: reliable-998-of-the-time/1#.Ve2_K3nlvIU  Federal Bureau of Investigation. (nd). Voice Recognition. [accessed 7 September 2015]. Retrieved from: excellence/modalities/voice-recognition  Levoreader.(nd). Biometrics Explained. [accessed 7 September 2015]. Retrieved from:  M2sys.(nd). M2-PalmVein™ – Secure palm vein scanner. [accessed 7 September 2015]. Retrieved from:  Nuance. (nd). Voice Biometrics. [accessed 7 September 2015]. Retrieved from: