JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.

Slides:



Advertisements
Similar presentations
Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometric Onno W. Purbo Biometric Measurable physiological and / or behavioural characteristics that can be utilised to verify the identity.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
Speaker Recognition By Afshan Hina.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
AIRPORT SECURITY Christiane, Kayla, Ally, Gracie.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
Biometrics.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Molar Money Banking By: Nathan Arey, Jacob Smith, James Hansen, and Collin Deathrige.
Physical security By Ola Abd el-latif Abbass Hassan.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
BIOMETRIC TECHNOLOGY By: Ashton Crowe, Lily Harvey, Cade Mersch, and Jack Richards.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Biometrics in the Banking Industry
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
FACE RECOGNITION TECHNOLOGY
By: Nathan Arey, Jacob Smith, James Hansen, and Collin Deathrige
Stovall and Klee Security
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Campbell’s Security Co. ™
TECHNOLOGICAL PROGRESS
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride

Name and Mission Statement JAAK Security Mission Statement: To secure our member’s assets both inside and outside of the facility using cutting edge technology. We Know JAAK about security!

Proposed Security Plan Phone o Interactive voice recognition system ATM/Inside o Ultrasonic Frontal Sinus Scanner (U.F.S.S.)

The Science Behind the Biometrics Voice Recognition Non-contact, non-invasive, easy to use Text or non-text dependent o text dependent will require a specific key phrase o non-text dependent analyzes free speech pattern Both methods recognize unique voice characteristics o the sound, pattern, and rhythm of speech is measured and assigned a numerical score that is compared against a voiceprint on file

Ultrasonic Frontal Sinus Scanner (U.F.F.S.) Recent forensic anthropologist research has demonstrated that the shape of the frontal sinuses is as unique as a fingerprint We have all seen iris scans and retinal scans beaten The Science Behind the Biometrics

All of our ATMs and teller windows will be equipped to passively scan the frontal sinuses using safe ultrasonic energy. o the unique shape of the frontal sinuses will be compared with a scan on file.

Our System

Accuracy of the biometrics Voice Recognition Using both text dependent and independent methods allows for an extremely accurate double layer of security. U.F.F.S Completely accurate (barring unfortunate decapitation) You'll never be minus your sinus!

Limitations Voice Recognition o Quality of the phone connection, ambient noise, and illness U.F.S.S. o If a major accident causes a significant change in facial structure. o Must go into the bank to get your initial facial scan.

Success Story (reveals potential of biometrics) Arnulfo Gonzalez My wallet was stolen on the subway, and my ATM card was in it. Because my bank uses U.F.S.S. I knew my money was safe even though that mean robber had my ATM card and ID.

No one can “beat” this system Voice Recognition The only way to beat the voice recognition would be to have both the text dependent key phase and the text independent sound, pattern and rhythm of speech. U.F.S.S. The only way to beat U.F.S.S., would be to have the account holder accompany the would-be thief to the bank.

Privacy Issues All account holders of the bank will record their voice print and have their sinus scan in a private room through speakers and video that link directly to our secured server. All data is secured in our state of the art facility in an undisclosed location.

To Conclude… This presentation will self-destruct in 3 seconds... We Know JAAK about security!