T otal T ransparency S olutions Total Registration and Protection Solution for participants at the final New Sciences of Protection conference Prototype.

Slides:



Advertisements
Similar presentations
1 US Investigator Meeting DIAS-4, Chicago, July 2011 Good Clinical Practice (GCP) for Investigators and the Research Team.
Advertisements

Fathom Five 2005 Scuba Diver Safety Awareness Program (SDSAP)
1Copyright © 2012, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group August 6, 2012 Redmond, WA PWG F2F Meeting Joe.
Referrals to Child Protective Services Regarding Substance Exposed Infants Bradley J. Wentz, MSW Child Protective Services Supervisor Charlottesville Department.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Internet Rechartering Update System Enhancements October 1, 2010.
Welcome! Lets check your knowledge of Ohio Motor Vehicle Laws!
Welcome Orbit Communications Pty Ltd. Introduction Orbit formed as sole trader in 2002 Incorporated as Proprietary Limited company in % Australian.
FWCHSSOA/PHRA Field Clinic Rule 12 Misconduct Gilbert Rosario October 19, 2013.
COIN CURRENCY GRADING By P.C.G. INDIA
Welcome Orbit Communications Pty Ltd. Introduction Orbit formed as sole trader in 2002 Incorporated as Proprietary Limited company in % Australian.
Confidential Iris Authenticati on System Optics and Digital System.
1 1 EMERGENCY ACCREDITION TEAM. TRAINING and ORIENTATION Did you receive any training of the following : BLS and Other life support. fire and safety.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Ultra-Sound Obstetrics 2012 The Ultimate Medical Report Writing Application.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
SiteMate For industrial (e.g. power stations) confined space automated entry management One product range – infinite applications!
Your Fleet Management Solution OSHA Logbooks Your vehicle sends information automatically to your password protected Internet Site. From your computer,
Tagging Technology for the Masses (TTM) Trevor Maynard Dan Santoni.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Access Control & Escorting Responsibilities Objectives Different Badges Used at SNL Badge Responsibilities Escorting Vouching (Allowing Someone to “Piggyback”)
Safety Training: Technical Training Clearance Procedure Authorized Employee This course is best viewed with headphones or speakers, the audio.
Welcome in “We Can’t Help Everyone, But Every One Can Help Someone”
Reception.
Full Name:Date of Birth: Address: Postcode: Why are you taking part? Employer: Occupation: How did you hear about this? Home No: ______________________________.
Securing Data in ePassports Policy Issues ICAO/NTWG.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential: DO NOT DISTRIBUTE Cisco TelePresence ROI Analysis Findings Your Name Your Title Date.
SmartSuite Software, Web based Time Attendance Software Visit website –
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Lockdown 2010 The conference will be begin at 7:45am Please check-in at the registration table in the atrium and pick up a conference hat, name tag and.
CHAPTER 1 NJ Driver’s License System
NALSA.  To minimize harm or secondary victimization of victims of trafficking  To protect and safeguard the rights of victims and witnesses of trafficking.
WSU Travel Charge Card. Training Objectives Explain the program Explain WSU’s use of the card Explain some details about using the card.
Update for nurses and phlebotomists taking blood samples for Transfusion in General Practice The Hospital Transfusion Team
RAPT RFID based Asset and Personnel Tracker Team 24.
Welcome to Newcastle City Learning. About the course… Aims of the course Level Length Attendance Demands Assessment and Progression Costs.
Registration The Registration system is a fully integrated solution for today's registration requirements in any country. Covering ID, Passports, Visa’s,
A Tutorial: Simple Steps for Trial Registration.
Tampering- Detection and Prevention Overview I/M Solutions Forum 2016 Tampering- Detection and Prevention Overview 2016 I/M Solutions Forum
22016 AP ® Preadministration Session You need… #2 Pencil Your iPAD if you would like to access a copy of the powerpoint. Answer sheet Student Pack Textbook/notebook.
1 Module 2: HIV Counseling and Testing for PMTCT Ministry of Health/HAPCO, Ethiopia.
Welcome to Newcastle City Learning. About the course… Aims of the course Level Length Attendance Demands Assessment and Progression Costs.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
2017 AP® Preadministration Session
Work Experience and Placement Welcome!
Kiosk Payment Systems, LLC
Global KeyAccess Technologies Ltd.
Welcome to NAMSS Mini ACER
ADDRESS.
Step 1 Login on UHCP Site
KINREP A Karvy Business Segment.
2017 AP® Preadministration Session
? ? The Safety Pays Pyramid.
Security of Data  
RFID Security System Problem Impact Approach Diagram
UKA Athletics Leader Take a workbook Turn to page 2
2013 AP® Preadministration Session
New School Violence Law; HIPAA Privacy Training
UKA ATHLETICS LEADER AWARD
Contents About Us Your Destination Your Itinerary & Accommodation
Contents About Us Your Destination Your Itinerary & Accommodation
2019 AP® Preadministration Session
London Youth Introduction to the Quality Mark.
Contents About Us Your Destination Your Itinerary & Accommodation
SECURITY/BAGGAGE TYPE CABINET OPERATOR TRAINING COURSE
Protecting Student Data
Presentation transcript:

T otal T ransparency S olutions Total Registration and Protection Solution for participants at the final New Sciences of Protection conference Prototype demonstration by Total Transparency Solutions employing its innovative SafeTBioID TM safety biometric ID card scheme Our motto: There are no secrets to safety Lancaster University June 10-12, 2008

T otal T ransparency S olutions Ensuring safety is hard! Old Approach Presumption of guilt Hostile Opaque TTS Approach Presumption of innocence Friendly Transparent

T otal T ransparency S olutions ID cards Government data is used to print ID card –ID number –Birth registration –DNA sequence –Facial image –Personal risk factors –Public risk factors (max 350)

T otal T ransparency S olutions SafeTBioID Prototype of SafeTBioID TM conference name card 2D barcode with full personal data for remote optical reading Personal risk factors A=Athletes Foot D=Internet Obsessive Disorder I=Insomnia L=Lung Cancer O=Overweight P=Pregnancy Public risk factors B=Anti-Social Behaviour F=Flatulence H=Hijacking L=Lung Cancer O=Overweight P=Pregnancy RFID tag with full personal data for remote wireless reading Biometric samples provided: B=Blood F=Feces H=Hair N=Finger Nail S=Saliva U=Urine Public risk score: 0-99=Safe =Caution =Watch out! =Lock up now High Public risk attendee T O T A L T R A N S P A R E N C Y S O L U T I O N S

T otal T ransparency S olutions Risk calculations

T otal T ransparency S olutions Bio-registration form Biometric samples: Dab or insert a very small sample of each bio in the circle indicated. Please tick box to indicate presence of sample as it may be invisible Birth date (y/m/d) / / City: Country: Family Name: First Given Name: Middle Initials: Saliva StoolFingernail clippingBlood UrineHair

T otal T ransparency S olutions

T otal T ransparency S olutions SAFE ZONE For your safety and security, this area is equipped with ubiquitous 24 hour fully automated video sensing, recording, algorithmic analysis and protective intervention devices. For full details, visit TotalTransparencySolutions.org

T otal T ransparency S olutions Surveillance Infrastructure

T otal T ransparency S olutions Risk based prohibitions

T otal T ransparency S olutions Rules for Safe Conferencing 1. All attendees are required to wear visibly their official conference ID badges at all times 2. No more than two high public risk attendees (i.e. red badges, >200 public risk score) may meet on their own 3. In no gatherings can high-risk attendees outnumber normal- risk attendees 4. All suspicious activity or objects must be reported immediately to the conference authorities at the Safety Information Centre 5. Non-reporting of suspicious activity or objects is treated as suspicious 6. Conference authorities reserve the right to intervene at any point to maintain public as well as personal safety 7. Violations of these rules are grounds for demotion to high-risk status, fining, rehabilitation, eviction and even detention.

T otal T ransparency S olutions We welcome feedback Have a safe conference!