Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.

Slides:



Advertisements
Similar presentations
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Advertisements

By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Retinal & Iris Scanners
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Stovall and Klee Security
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Biometric Security Palm Vein Technology
Biometrics.
Margaret Brown 3rd period October 14, 2007
Fingerprint Identification
Fingerprints EHS BioMed/Forensics.
Biometric technology.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Campbell’s Security Co. ™
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick

Client  Our client, a bank, wants to secure access to accounts within the building, over the phone, and at ATM’s.  Biometrics will be used to provide the ultimate security.

Plan Proposal  In order to protect our valued clients financial assets, we need a system that accommodates ease of access and supreme security.  Access to the physical building will only be granted with a hand scan at the outer entrance.  ATM access will be granted with both ear and fingerprint scans.

Plan Proposal Continued  To access the Security Deposit Boxes, 2 different fingerprint scans will be required.  To access your account over the phone, we will be using voice recognition software.

Advanced Security for ATMs  Ear recognition  Fingerprint scanning  These forms of biometrics will secure the accounts, improve accuracy, and prevent fraud from occurring.

What is Ear Recognition?  Visual form of biometrics  Identification using shape of ear  In a new shape-finding breakthrough  “Image ray transform”  Scientists found that outer ear may prove to be one of the most accurate and least intrusive ways to identify people.

Why Ear Recognition?  99.6% accuracy  More user-friendly  Hard to break the system  Preferred over fingerprint scanning because fingerprints rub off and callouses can form because of hard, repetitive labor.  $100

Potential Limitation  Earless customers  Glitches in the system  This is why we will have fingerprint scanning as a back-up.

Success Story  Two years ago, a government agency installed ear recognition along with retinal scans. So far, there has been no breaks in the system.

Fingerprint Scanning for ATMs & Safety Deposit Boxes  Fingerprint scanning will improve accuracy and prevent any fraud from occurring.  Our technology will include the use of scanning two fingers to increase safety.

What is fingerprint scanning?  Fingerprint scanning is a biometric tool that memorizes the unique contours of fingerprints.  The fingerprint scanner stores and memorizes the contours, loops, whirls and arches of each individual finger print in its system so that it will identify the user specifically.  It uses key differences/points of location on each finger that set it off from other peoples’ fingers. It analyzes the crossover, core, bifurcation, and ridges to code data specific to that one person.

Why use a fingerprint scanner?  Even as one of the first biometric inventions, it still remains top of its class of biometric devices at a 99.8% accuracy rate.  Many people use fingerprint recognition on a day-to-day basis.  Finger scanners are in iPhones, USBs, Laptops, and many other devices.  Fingerprints are a very reliable form of biometric security because the fingerprint is a unique, unchanging feature.  $70-200

My Fingerprint Success Story  The United States military used biometric devices in the field in Kosovo to identify both friendly and hostile people. Combining fingerprint technology with iris recognition, the military was able to quickly and effectively help Marines in the field to deescalate war situations.

Limitations to Fingerprint Scanning  You can only use fingerprint scanning if...  You have fingerprints.  Scanners can pick up dirt and oils that may prevent your finger from being scanned correctly.