Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.

Slides:



Advertisements
Similar presentations
Management Presentation February Opportunity Summary Financial Services Market Problems: –Electronic Content Needs Low Cost Payment System –Like.
Advertisements

Model: TA
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Plastic Money All Cards Are Not The Same!. A New Class: The Asset Poor Asset Poverty Rates by Race in the United States African AmericanHispanicNative.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Electronic Transaction Use & Risk of Identity Theft.
Stubbornsoft. Point of Sale Application Retail & POS Management Solution supports bar code readers for faster checkout and inventory control, printing.
Biometrics: Voice Recognition
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Data Mining By Jason Baltazar, Phil Cademas, Jillian Latham, Rachel Peeler & Kamila Singh.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
Understanding a Credit Card Take Charge of Your Finances.
Credit Cards The Essentials to Take Charge of Your Finances In your opinion, do consumers spend more per month on average when they use a credit.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
Anonymity, Security, Privacy and Civil Liberties
Britannia/NET1 Web Seminar 2007 Presented By: NET1 Payment Solutions Presenter: Brian Morabito.
Financial Literacy By. What I Know about Savings.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Solutions to Security and Privacy Issues in Mobile Social Networking
Unit 4: Banking Section 4: Making bank technology work for you.
Understanding a Credit Card Take Charge of Your Finances
The next generation of payments is here. Is your business ready?
Computerized Accounting Systems The new ways we “PLAY” with money.
MUHAMAD SYAFIQ BIN BORHANUDIN SR2211M1.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
“Fingerprint Recognition based on Silicon Chips”.
New services offered by credit agencies The issue of transparency.
Personal Finance BF05 This course prepares students to understand economic activities and challenges of individuals and families,
21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March
GUESS? Overcomes Online Fraud By Heidi Larson. GUESS, Inc. Started as a jeans company Now makes all types of apparel Brick-and-click company Guess.com.
CREDIT REPORT PODCAST Marion Davis What is a Credit Report?  A credit report is information compiled by a credit bureau from merchants, utility companies,
Kelly Munoz & Callie Gaskin. Fiat money (paper currency and coins, make up only a small part of America’s money supply. A much greater part involves a.
Atsource Solutions Inc. Atsource Discharge of Mortgage System What is it? How easy is it to use? How Efficient is it? Why do you care about efficiencies?
Fighting Identity Theft with Advances in Fingerprint Recognition Dick Mathekga.
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
Credit In your opinion, do consumers spend more per month on average when they use a credit card or cash?
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Smart Pharmacy. Introduction Current Scenario Software has become an indispensable tool in any organization. Companies are offering products that can.
Understanding a Credit Card Take Charge of Your Finances
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
Credit Questions to Consider  What is credit?  Does credit cost?  What are the advantages of using credit?  What happens if I misuse credit?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Banking and Borrowing Chapters 5-7 in Text. Financial Institutions.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Credit Advanced The Essentials to Take Charge of Your Finances In your opinion, do consumers spend more per month on average when they use a credit.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
 In your notebook: › Draw › List › Write › Everything you know about credit and credit cards. › When the time sounds, share your list with your partner.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
Introduction to E-commerce Principles By Dr. Gabriel.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
FORGERY & FRAUD DETECTION USING BIOMETRICS Presented by: B.GOPINDRA(08TD1A0407)
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Small Business and Personal Credit
Entrepreneurship Secure Ordering Presented By Mrs. Bowden.
Digital Signature By: Jermel Lee.
FACE RECOGNITION TECHNOLOGY
Understanding a Credit Card
Biometric Security Fujitsu Palm Vein Technology
Get 1 Year Loans For Bad Credit In Canada With Easy Monthly Installments
Biometric Security Palm Vein Technology
Who Uses Encryption? Module 7 Section 3.
Personal Finance BF05 This course prepares students to understand economic activities and challenges of individuals and families,
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation transcript:

Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004

Introduction Identity theft has become one of the most common forms of criminal activity Credit card fraud is the main form of identity theft

Introduction Identity theft is on the rise and shows no signs of slowing down

Introduction Cost businesses and financial institutions a total of $48 billion in 2002 Cost consumers another $5 billion in 2002

Current Problem Credit card numbers are easily obtained from transactions Actual credit card is not needed for transactions, just the number Human factor – we lose things!!

Fingerprint Scanner

Capture Extraction Preprocessing Detect minutia System search for similarities (matching process) Acceptable score How it Works

Advantages Time to develop –12 to 18 months Provides greater security – now two requirements are needed Fast and easy to use Inexpensive, price ranges from $50 - $200

Concerns Now my fingerprints are accessible to criminals Modification of software and hardware

Conclusion Identity theft is a problem that has no preferences and can attack any of us at any time A growing need and thus demand for a solution Greater security leads to a more peace of mind

References