Anonymous Biometric Checking By Lunda A. Wright Supervised by Prof. P. Wentworth Co-supervised by Mr. J. Ebden.

Slides:



Advertisements
Similar presentations
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Advertisements

1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Department of Labor HSPD-12
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Electronic Transaction Security (E-Commerce)
The Role of Computers in Surveillance ~ Katie Hatland.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
Biometrics and Authentication Shivani Kirubanandan.
Paying via the Net Jan Damsgaard Dept. of Informatics Copenhagen Business School
RoboTutor In Perspective: What it does…. RoboTutor in Perspective… Need Training Employees & Students.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
Category: e-Business & Financial Inclusion
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
 An electronic device that processes data and converts it into information that people can use.
ICA on-line shopping & on-line banking. On-line shopping In early days of internet this was limited due to concerns over security of personal and bank.
 1 E-commerce companies to individual customers (Business-to- Consumer), and the term is shorthand for B2C, which represents trade between the companies.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Examples of TPS 1 In this section, we examine the: components of a TPS the examples of real-time transaction processing batch transaction processing.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
ICT in Business & Commerce AS Module Heathcote Ch. 2.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Privacy of Identity and Personal Information on Electronic Networks: “Using tickets and aliases to ensure personal information privacy” By Lunda A. Wright.
Security and Privacy Concerns Izzat Alsmadi, Assistant Research Professor, BSU.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 43 Every transaction cycle: –Relates to other cycles.
Options for Managing CARMA Databases Prepared by David Taylor Taylor Geomatics.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
E-Commerce. E-commerce at the consumer level  Online shopping (B2C transactions)  Online banking  Online Finance E-commerce at the business level 
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Welcome to to NSIC Software. This product is mainly developed for NSIC office maintain records of clients.  Following Features Provided by this software.
Presentation for Bangko Sentral NG Pilipinas CONFIDENTIAL.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Electronic Commerce Chapter 11 – Computers: Understanding Technology, 3 rd edition 1November 17, 2008.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
Electronic Commerce Chapter 9 – Computers: Understanding Technology.
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Systems that support electronically executed business transactions.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Solving a last-minute hitch Name:
Managing Risk and Growing Sales 24 th March 2016 Chris Lomax, Senior Director, EMEA Solutions Management.
Credit card is one excellent tool to make your day to day living comfortable and worry free. Especially if you’re a business person and thinking of starting.
Do Now: Credit Cards In 3-5 complete sentences, explain what you know about credit cards.
Identity Theft It’s a crime!
How to Learn Bookkeeping At Home?
Internet Safety lesson AP World History & World History
How do we buy and sell on the Internet safely?
Advantages of ICT over Manual Methods of Processing Data
Security Barriers Asset Proper Access Attack Security System
Use of Biometric Technology in Payments to avoid Frauds
ارائه دهنده : رضا دادآفرين مرداد ماه 1389
Cybersecurity and Personal Finance
11 Business and Technology 11-1 Computer Systems
ديبــــاجــــــة: صادق الكنيست الإسرائيلي في تاريخ على اقتراح قانون دائرة أراضي إسرائيل (تعديل رقم7) – 2009 الذي يشكّل، عمليًا، خطة إصلاح شاملة.
Business and Technology
ELECTRONIC PAYMENT SYSTEM.
15-5 Automated Fingerprint Identification System
Ultimate Government Intervention
RFID (Radio-Frequency Identification)
Presentation transcript:

Anonymous Biometric Checking By Lunda A. Wright Supervised by Prof. P. Wentworth Co-supervised by Mr. J. Ebden

Have you ever… Planned a holiday through a travel agent? Bought a car? Acquired medicines from a pharmacy? Applied for a bank loan? Do you recognize this man? Big Brother is watching you…

More background A company in is working with the to provide an online national database of biometric information. They will sell appropriate fingerprint scanners and point-of-sales to allow merchants to verify your identity.

The Problem This is an issue of PRIVACY. Your dealings can be tracked too closely by a “bigger brother”. There are valid property security concerns.

The Answer A merchant needs to know who you are without you being tracked by the verifying agency without you revealing vital personal information

Issues to consider How will your information be entered and stored? How will the information be accessed? How will a transaction be completed?

Output A protocol that uses biometric information to anonymously prove your identity. Not the use of Smartcards!

Extensions Let’s remove the POS and see this be done over the internet… Let’s go beyond merchant transactions. The police want in…

Any questions?