A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes.

Slides:



Advertisements
Similar presentations
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Advertisements

Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
PALM VEIN TECHNOLOGY.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Medical Imaging Technology
Cardiac Emergencies Section 5 The objectives will appear in Red
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
How FACILITY CMIS and E-Portal are used within the organisation
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Information about Biometrics and its security By Ridham Bhatt.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
A NEW THEME FOR THEME PARKS COMPANY : ID LINK. MISSION STATEMENT In all the ways we scan, save, and serve. Will it ensure honesty? Promote safety and.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Access Identification © 2014 Project Lead The Way, Inc.Human Body Systems.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
R ETINAL S CANNING by the Man, the Myth, the Legend Justin Thompson.
BIOMETRICS.
Crime Scene Basics Forensic Science.
Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION.
Retinal & Iris Scanners
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
BIOMETRIC TECHNOLOGY By: Ashton Crowe, Lily Harvey, Cade Mersch, and Jack Richards.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
An Introduction to Biometrics
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Management Information Systems & School Registration 1.
Black Ice Security Services
Stovall and Klee Security
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
access identification
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
Biometric Security Palm Vein Technology
BSC Biometric Security System
Government Security Seriousness
BSC Biometric Security System
By: Julia Elder, Anna Eades, Marques Angel
BIOMETRIC TECHNOLOGY LOGO BUS 237- D100 Group 1- Tut02 Mandy- Wondy
Presented by: k.ramya krishna
Campbell’s Security Co. ™
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes

“A Better Tomorrow” Mission Statement – Protecting the people from what they don’t want to know. Motives – A Better Tomorrow ensures that all files/reports/accounts will be secured 24/7. No person will allowed access to these files without first being recognized by many thorough biometric scans/tests.

A Plan to Protect Our security system will have two tiers: lower and upper The lower system will be for the secrets that don’t need to be as heavily guarded and will protected by a Retinal Scan and a Vascular Pattern Recognition. The upper system will guard the secrets few know and will cause the downfall of the government if brought to the public’s attention. It will be guarded by the methods mentioned above as well as Deoxyribonucleic Acid Recognition, specifically a Buccal Swab.

The Science Behind the Madness (Retinal Scans) Retinal Scans – Beam of low-energy infrared light casted into eye when looking at scanner Traces a standard pattern on the retina – Retinal blood vessels are put into a template and compared to the template that was captured in the “entering the database” process Pros – Very accurate – Quick scan – Cannot be forged – Error rate of 01 in 10 million Cons – Entering the database is not time efficient

Retinal Scan Picture obtained from: n_800x600.jpg

The Science Behind the Madness (Vascular Pattern Recognition) Vascular Pattern Recognition – Nearly-infrared light passing through the skin Due to blood vessel absorbance, veins appear and create a template – Scans are compared to same template – Can be done through back of hand, palm, or finger Pros – Difficult to Copy – Less Contact – Capable of Multiple Patching – No Need For Keys or Passwords Cons – Blood Has to be Flowing – Amputees Can’t Use It – Very Expensive

Vascular Pattern Recognition Picture obtained from: atform-7/biooptics-world_/articles/print-articles/volume- 3/issue- 1/0369.res/_jcr_content/renditions/pennwell.web jpg

The Science Behind the Madness (Buccal Swab) Buccal Swab – Back of cheek is swabbed with a generally long swab Removes cells to be examined by police investigators and medical lab technicians – Compared to template that is created when entering the database Pros – Very Accurate – Hard to Replicate Cons – Time Consuming – Not Updated Database If database is not updated regularly, some of the deceased’s DNA could take up room on the database, causing possible issues – Using Other DNA

Buccal Swab Picture obtained from: m7EtevKxVupr9xzxg&pid=15.1&P=0&w =300&h=300

Limitations DNA can be copied. Equipment can be very expensive Eye trouble – Those who have medically diagnosed eye complications may have trouble with the retinal scans Blood Circulation – Vascular pattern recognition may be a present issue with those with blood disorders/diseases – Vein Complications Time consuming – Entering the database would not be time efficient and may cause patient discomfort Need regularly updated databases

Beating the Seemingly Impossible Copying of DNA – Nearly the only way to beat our system is to have copied the DNA of a certified member who has been entered into the database. However, even that process would require very accurate equipment, making it unrealistic. A few days after death, the blood vessels behind the retina start to decompose, therefore making it very difficult to forge a retinal scan. For a vessel pattern recognition to work, the blood must be pumping, so any intruders could not used an unconscious or dead victim. DNA is hard to replicate and is accurate to a T, but can be forged with the right supplies. However, any intruders must provide all three tests, so it is nearly impossible for someone to invade the database of information.

Success Story Tried to take a government officials important files Retina scan stopped them before they reached upper tier

Sources Biometric Newsportal.com. (nd). Retina Biometrics. [accessed 07 September 2015]. Retrieved from Biometric Newsportal.com. (nd). DNABiometrics. [accessed 07 September 2015]. Retrieved from Explainer: Vascular Pattern Recognition. (2015). Biometricupdate.com. [accessed September ]. Retrieved from: recognition recognition King, Rawlson. (2013). Explainer: Retinal Scan Technology. [accessed 07 September 2015]. Retrieved from technology technology Mayhew, Stephan. (2012). Explainer: Vascular Pattern Recognition. [accessed 07 September 2015]. Retrieved from recognition recognition Retinal Biometrics. (nd.) biometricnewsportal.com. [accessed September ]. Retrieved from: wiseGEEK.com. (nd.) What Is a Buccal Swab?. [accessed 07 September 2015]. Retrieved from swab.htmhttp:// swab.htm