Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology

Slides:



Advertisements
Similar presentations
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
Advertisements

BIOMETRICS CONSORTIUM CONFERENCE BALTIMORE, MARYLAND September 19 – 21, 2006 Bill Wipprecht EVP/Chief Security Officer Corporate Security Wells Fargo &
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Beach Park Schools Beach Park, Illinois Introduces.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
PALM VEIN TECHNOLOGY.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
Forms Management: Compliance, Security & Workflow Efficiencies.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Aigars Jaundālders DPA Riga, April 20th, 2007 Information management Healthcare perspective v 1.0.
A New Kind of Timesheet Brings Biometrics to Main Street Neal Katz Vice President Count Me In, LLC Mt. Prospect, IL
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Biometrics.
Why FIDO Matters? Healthcare Tom Groom CEO October 5th, 2015 Confidential.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Fighting Identity Theft with Advances in Fingerprint Recognition Dick Mathekga.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
CSCE 201 Identification and Authentication Fall 2015.
Global Palm Vein Biometrics Market WEBSITE Single User License: US$ 2500 No of Pages: 56 Corporate User License: US$
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication.
Health Insurance Eligibility Verification and Authorization:
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
10 Advantages of Integrating Biometrics with Membership Management Software.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology

Confidential – Do Not Distribute Agenda Why you can trust me Patient identification in context A lesson on biometrics Why iris biometrics? Diligence Demo/Q&A

Confidential – Do Not Distribute You can trust me because…

Confidential – Do Not Distribute President and Co-founder of M2SYS Technology A decade of biometrics experience Deployments in over 90 countries Nearly 100 million end users enrolled Expertise in many industries and across all project sizes “Hybrid Biometrics” system supports fingerprint, finger vein, palm vein, iris and face recognition Parent company of M2SYS Healthcare Solutions LLC

Confidential – Do Not Distribute What do we expect?

Confidential – Do Not Distribute How important is accurate patient ID?

Confidential – Do Not Distribute Accurate patient ID has been #1 on the list of the Joint Commission on Accreditation Hospital Organization (JCAHO) National Patient Safety Goals since 2003.

Confidential – Do Not Distribute Patient safety starts with accurate identification!

Confidential – Do Not Distribute Increase Patient Safety Prevent Duplicates Eliminate Fraud Lower Liability Create Efficiencies

Confidential – Do Not Distribute Challenge: Fraud

Confidential – Do Not Distribute Some Stats  1.5 million Americans per year are victims of medical identity theft  Overall healthcare fraud is estimated to cost between $70 billion and $255 billion per year  Medical identity theft settlement cost for healthcare facilities can be as much as $250,000  The average cost to restore a person’s identity after medical ID theft is $20,160  Medical Identity Theft has a lasting impact on the patient and the facility

Confidential – Do Not Distribute Software (Red Flag Events) METHODPROBLEM Probing Patients for More Info Awkward / Uncomfortable

Confidential – Do Not Distribute Challenge: Duplicates

Confidential – Do Not Distribute De-Duplication Software METHOD PROBLEM Consultants/MPI Cleanup None prevent future duplicates Merge Records Internally

Confidential – Do Not Distribute Cost of Duplicates/Errors Operational cost of correcting duplicates: $50 per instance* Only 5 duplicates created daily = $78,000 Securing accurate patient information can prevent 90% of claim denials *Fox and Sheridan independent study 2005 NOTE: This calculation assumes only a 6 day work week. A 7 day work week = $91,000

Confidential – Do Not Distribute A Quick Lesson on Biometrics

Confidential – Do Not Distribute One-to-One (1:1) Verification Here’s who I am There’s my biometric template Let’s confirm to make sure! “Are you who you claim to be?”

Confidential – Do Not Distribute One-to-Few (1:Few) Segmented Identification Let’s hope you can tell me something about yourself Scan your biometric DOB 9/9/76 DOB 6/8/80 DOB 5/21/72 System compares only against small segment of database “Are you in this group?”

Confidential – Do Not Distribute One-to-Many (1:N) Identification Scan your biometric Compare against entire biometric database “Who are you?”

Confidential – Do Not Distribute Authentication Examples 1:1 Matches one record 1:FEW Searches a few records 1:N Searches every record

Confidential – Do Not Distribute Takeaways 1:1 and 1:Few CANNOT prevent duplicates or fraud 1:N CAN Why invest in a solution that can’t? Note: Our solution CAN.

Confidential – Do Not Distribute Why Iris Biometrics?

Confidential – Do Not Distribute First, let’s clarify – The iris is not the retina…

Confidential – Do Not Distribute The iris camera is just like any other digital camera. There is no red laser…

Confidential – Do Not Distribute Iris Advantages Extremely fast 1:N search speed (2 million/sec) The most accurate form of biometrics – chance of two being identical is Template has long-term stability; iris formed at 10 months Contactless Independently tested and certified

Confidential – Do Not Distribute What questions should you be asking?

Confidential – Do Not Distribute Due Diligence Type of authentication (e.g. 1:N)? Accuracy? Hygiene? Can it work for all ages? HIE/IDN? Standard and future-proof?

Confidential – Do Not Distribute You want a system to prevent duplicates and eliminate fraud (1:N matching) The biometrics market continues to evolve – consider a PLATFORM that gives you flexibility You want a system with proven accuracy in large-scale de-duplication that easily scales You don’t want to cut out a large portion of your patients – children You want to store the biometric images so you have an audit trail of authentication activity Why?