Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.

Slides:



Advertisements
Similar presentations
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Advertisements

Computer Security Computer Security is defined as:
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Information Security Policies Larry Conrad September 29, 2009.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
WELCOME.
Chapter 10: Authentication Guide to Computer Network Security.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha
Biometrics Authentication Technology
Biometrics.
+ Computer Password Manager Colin Raymond | Ritesh Sharma | Lubna Merchant | Sichen Sun | Kelechi Ajagba.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Data Security.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
BIOMETRICS.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
An Introduction to Biometrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
how to prevent them from being successful
Stovall and Klee Security
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Biometric Security Palm Vein Technology
Biometrics.
Margaret Brown 3rd period October 14, 2007
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Commercial Data Processing
BY: Michael Etse and Maverick Fermill
Ones Technology Products & Solutions
Presentation transcript:

Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1

 Internal  Building Access – Magnetic Card and Pin  Computer Access – User ID and Password  External  Customer Access – ATM card and PIN 2

Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive Sensitive Palm Vein Non-invasive Relatively Cheap Accurate Unfamiliar 3 source

Takes snapshot of palm veins Converts into alogrithm Compares with database 4 source

Contactless Non-invasive 2.18 seconds recognition speed 5 source

 Available Software Development Kit  Easy to integrate to current company system  Small  Cheap to produce  Easy to Install  Wide range of operating condition  Iris scanners are sensitive to light and temp. 6 source

7

 Vein patterns  Distinctive and unique to individuals, even left and right hands.  Difficult to steal or forge  False acceptance rate  A rate at which someone other than the actual person is falsely recognized.  False rejection rate  A rate at which the actual person is not recognized accurately. 8

*note – Chart created using average of data provided by the Table 9

Portable Mouse ATM Machine  ‘Palm Secure’ is now widely used in various fields.  ATM 92% of all Japanese ATMs 18,000+ ATM machines for Bank of Tokyo - Mitsubishi  School ID, Entry Key to private property, Log-in to PCs or servers  Potential is limitless  PalmSecure mouse with a build-in sensor in 2007  easily installed to personal computer. 10

 Administrative Impact  Reduces, prevents sensitive financial information breach Prevents law suits  Discourages workplace fraud  Easy to implemented, fast to train  Portability provide off-site access Without sacrifice security  Increases Productivity by Reduces password loss Reduces the need of Technical Help Desk 11

 Customer impact  Leading type of ID Theft Credit Card Checking/Saving account  2007 $45.3 Billion loss ( $5,592 per person) 8.1 Million victims (1 out of 8 American)  Reduce company loss  Give clients sense of security 12

 In comparison with other leading bio-tech, PalmSecure is  More Reliable, More Accurate  Fast  Small  Relatively cheap to implemented and operate  It can be use for  PC log-in  Building entrance  ATM machine, etc…  Protect sensitive financial information  Reduce loss due to identity theft 13

Protect Our Clients. Protect Ourselves. 14

15