By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.

Slides:



Advertisements
Similar presentations
Photographing at Night Seeing Different Fireworks Temples/ Lit Buildings Bulb Exposures By Stacy Robbins.
Advertisements

Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
Roleplaying. Grandma & Money You are 25. You want to borrow 360,000 kuai from your rich grandmother to start a business. You have not seen her in 3 years.
St. Luke’s Children’s Advocacy and Community Education Implement Plan The focus of this internship included children’s awareness and injury prevention.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
The Role of Computers in Surveillance ~ Katie Hatland.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Second Grade English High Frequency Words
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Financial Services & Electronic Banking Ch PoB 2011.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
Validation and Verification
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
The Human Eye 6 th Grade Science. Parts of the Eye Eye Socket Pupil Cornea Iris Eyelashes Eyelid Sclera Orbital Muscles Optic Nerve Lens.
On Saturday 5 th May 2012 Luton will be in the national spotlight as a large scale protest will be taking place in the town centre.
The monitor of an computer is essential but at the same time its not. Well because in simple terms the monitor allows you to see what you are doing. Then.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
HEALTHY CHOICES: Your Sense of Sight Ms. Mai Lawndale High School.
Final front cover When it came to the different genre conventions i took a bit of time examining the elements held by a Hip Hop music magazine which.
Sight words.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
The Great Diamond Heist Evidence, Warrants, and Conclusions.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
A NEW THEME FOR THEME PARKS COMPANY : ID LINK. MISSION STATEMENT In all the ways we scan, save, and serve. Will it ensure honesty? Promote safety and.
Unit 8 LANGUAGE FOCUS. Content  Word study  Word used in Computing and Telephoning  Grammar  Pronoun  Indirect speech with conditional sentences.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
DAILY QUESTION March 18, Do you wear corrective lenses (contacts or glasses)? 2. Do you know why you/or others wear these?
Mr. Stasa © You should be able to:  Identify the different parts of a personal check  Complete a personal check  Endorse.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Aladdin Security We supply what others can only assure.
Presenter’s name Presenter’s title. Contents The current situation Reducing collisions in London [INSERT ORGANISATION NAME]’s policy How we’re helping.
Patient Identification at DUH “ALWAYS the Right Patient” We put the person who needs our care at the center of everything we do Requirements for Staff.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Keratometry and Corneal Topography Instructions. Generally the keratometer & corneal topographer are combined into one instrument that does each reading.
1~888~787~9274 Yahoo Customer Service online mail services
ORAL WORK.
DATA COLLECTION Data Collection Data Verification and Validation.
Black Ice Security Services
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Iris Recognition Eyetracker – IRIS is the KEY
Checking Literacy Consumer Education
information in black might be on the Safety Quiz!!
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
BSC Biometric Security System
Parents/carers: what can you do?
BSC Biometric Security System
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Mother Baby Security By: Lynzy Swartz, Grace Broughton,
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Starter On page 8 of your book answer the following questions.
Consensus Pie of the 7 ART ELEMENTS.
Presentation transcript:

By: Ash, Jess, Natasha, Eslie

 Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.

 Earn more money.  Stop letting in those with admission passes that are not theirs.  Sell more admission passes (tickets).

 Upon being born, after regular procedures are performed, the baby is taken to a room to get their iris’ scanned. The scanner catches the shape of the iris, the colors, where the colors are, the shape of the eye, etc. Every year, until they reach age 7, they come in for annual scans for the best performance all around, with more accurate results.  Once they reach age 7, they come in every 5 years to get their eye rescanned for more recent and accurate results.

 Buying tickets at the park: If you are buying a ticket at the park, you need to have recent eye scans done within 5 years. If not, buying an admission ticket will require paperwork within the process. Once you purchase your ticket, the ticket seller will scan the ticket’s barcode, scan your eye and link them together. When you walk to the entrance of the park you have to hand them your ticket then scan your eye. Unless a malfunction occurs, you will be allowed into the theme park.  Buying tickets online: If you are buying tickets on the internet, you need to have your eye identification code handy. If you do not have it or are able to access it, you are not eligible to purchase a ticket. Once you purchase your ticket, you will have to punch in your eye identification code to be able to complete the transaction.

 It may seem very futuristic, but all it is, is a digital camera  It takes visible and near infrared light to take pictures of a persons iris.  The infrared makes the persons pupil darker than what it usually is, making a high contrast between the iris and pupil.  The camera either focuses automatically or you use a mirror or audible program from the eye scanner to make sure it’s positioned correctly.  Your eye is position 3-10 inches from the camera.  Once the picture is taken, the computer captures: ◦ The center of the pupil ◦ The edge of the pupil ◦ The edge of the iris ◦ The eyelids and eyelashes  It analyzes the iris and pupil, forming it into a code.

 If it weren’t for the eye scanner, then people would still come in our theme park using admission tickets that were already used. They’d leave the park with a stamp on their hand, hand the ticket off to somebody who wanted in, and so on. It was eating holes into our pockets with our money. We were close to going into debt. It was scary.  But see, the eye scanner stopped all that. It made to wear you had to have had your eye scanned as a young child and up. If you produce the code when purchasing the tickets, you couldn’t buy any. Also, if you had a ticket you didn’t buy and it came across the computer, you wouldn’t be let in. Since we got it, more and more people have been buying tickets and having a blast.

 An eye recognition scanner uses 255 point matches within the eye, versus just 70 point matches in a fingerprint scan.  Your eyes tell no eyes…meaning that basically the chances of not accurately identifying a person based on their eye scanning is very slim to none.  The process is done entirely with technology and doesn’t require lots of paperwork, clean- up, etc.

 Eye Recognition scanners are very expensive. And in a large theme park, the costs generally need to be aimed more towards the rides and tourist aspects of the park.  Contact lenses and long eyelashes preventing a clear scan can cause complications.

 A few issues that might concern someone that passes through an eye recognition scanner is privacy.  Who has access to your identity while your scan is being analyzed?  In this situation, with our theme park, only the security department of the park will have access to your eye analysis and identity.  These security officers are held under law not to share any information with anyone else unless there is a safety concern or fraud identity case.

 4.htm 4.htm