Download presentation
Presentation is loading. Please wait.
Published byErika Watkins Modified over 8 years ago
1
BIOMETRIC TECHNOLOGY By: Ashton Crowe, Lily Harvey, Cade Mersch, and Jack Richards
2
COMPANY We are Tomorrows Safe Guard and we provide an outside facility with the option of up and coming security systems in order for them to make the best decision for their situation. Our mission statement is to keep your future bright and safe from tomorrows technology with tomorrows technology.
3
WHAT ARE BIOMETRIC TECHNOLOGY? “’Biometrics’ means ‘life measurement’ but the term is usually associated with the use of unique physiological characteristics to identify an individual. The application which most people associate with biometrics is security. However, biometrics identification has eventually a much broader relevance as computer interface becomes more natural,” (“What is Biometrics?”). “Biometrics is an authentication method that uses fingerprint or facial scans and iris or voice recognition to identify...” ("Biometric Authentication Know-how: Devices, Systems and Implementation").
4
TYPES OF BIOMETRIC TECHNOLOGY Fingerprinting- measures the fork and ridges in a persons fingerprint. Very accurate and is correct 95-98% of the time. A fake fingerprint or taking the finger off of a person unwillingly can allow access to a person who isn’t programed into the system. Voice Recognition- measures the sound, patterns, and rhythm of your speech and assigns your voice a numerical score within system. Not very affected because things such as head colds or sicknesses can affect the sound of the voice. A simple system can be beaten by a phone call or recording. Face- recognizes distance between eyes, nose, mouth, est. 80-90%, but can be beaten by a high resolution picture. Wright gain or lose can also affect the system. Signature Verification- recognizes the dynamic analysis of a signature to authenticate a person. Measures the speed, pressure and angle used by the person when a signature is produced. The signature can change based on hand injury and signatures can be forged.
5
TYPES OF BIOMETRIC TECHNOLOGY (CONTINUED) Eyes- two different types Retinal patterns of blood vessels behind the pupil. Will not work with people who have cataract or are blind. Iris- examines unique patterns of eye. Will not work with color contacts or certain pupil dilations. Can be beaten with a high resolution picture. DNA- attained through blood, hair, or saliva. No one has the same DNA unless they are identical twins. Can be beaten through collection of someone else's DNA. The only down fall to this system is that it can take hours to examine someone's DNA.
6
OUR SITUATION “A hospital interested in a better way to link new mothers and fathers with their newborn babies.” We are trying to make sure that babies are not “switched at birth” and that no one can steal a baby from the nursery. Even if the thief happens to be someone with clearance into the nursery. We will be putting two systems to use in order to ensure the top security.
7
SOLUTION ONE We plan to take a DNA sample from both the expecting mother and her husband when they enter the hospital. This information will be then put into a storage data base that can be accessed and used any other time one of the family members is using the hospitals services. Once the baby is born then a very small amount the babies blood will be draw and the DNA will then be extracted from their blood. Any family member who is a hemophiliac, will have a different source of DNA extraction for both them and their child. Alternative options will be given to the family for their preference. “We share 1/2 of our genetic material with our mother and 1/2 with our father. We also share 1/2 of our DNA, on average, with our brothers and sisters. Identical twins are an exception to this rule. They share their entire DNA between them,” (Strehowl). This will make it easier to pair up the babies with their parents. Little problems will be encountered because of the fact that we share ¼ with grandparents and even less with aunt, uncles, or cousins. This will make sure that even with other family in the same facility you will get your baby and not someone else's. One downfall would be if someone was to obtain a piece of the mother or fathers DNA and use it without consent, or some may consider any of the extraction option invasive and unnecessary.
8
SOLUTION TWO When someone goes to leave with a child they must complete a retinal scan. Just like the DNA scan, mothers and fathers must scan both of their retina's upon arrival and scan them once again upon leaving at the front desk and no alternative rough shall be permitted to anyone with a new born. This prevents people from leaving with a child. A complication that can occur within this process is retinal scans won't work on individuals who are blind or have cataracts. Also the possibility of a mother coming in with little time before birth not being able to complete a scan for the preparation time needed to properly give birth with the least amount of complications. One down fall of a retinal scan is that some people could feel as if this is an evasion of privacy. A secondary system will have to be put into place in order for blind parents or parent with cataracts to use.
9
SUCCESS STORY Here is a report from a new mother treated in a hospital in Maine who have the same system in place that we are proposing. She claims that, “I have always been a skeptic. Questioning every little thing around me. Is it safe? How will this affect my life? I was especially worried about me and my little Sicilia, but everything went better than I could have ever imagined. I think the DNA check they have in place is genius, and made me feel as if I could focus more on mentally preparing myself for the experience of labor, than memorizing my child's face. The whole process of checking in and out was quick and effortless. Even the retinal scan, just a quick beam in your eye and your finished. I will come back to our hospital instead of traveling to another one because I feel as if they have put into place the nesacary technology and security to keep me and my family safe.
10
WORK CITED "Biometric Authentication Know-how: Devices, Systems and Implementation." SearchSecurity. N.p., n.d. Web. 07 Sept. 2015. Strehowl, Anne Tecklenburg. N.p., 26 Aug. 2005. Web. 7 Sept. 2015. Tynan, Dan. "Biometrics: From Reel to Real." PCWorld. N.p., 18 May 2005. Web. 07 Sept. 2015. "What Is Biometrics?" N.p., n.d. Web. 7 Sept. 2015.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.