Access Identification © 2014 Project Lead The Way, Inc.Human Body Systems.

Slides:



Advertisements
Similar presentations
Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
Advertisements

Department of Labor HSPD-12
Vitaly Shmatikov CS 361S Biometric Authentication.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
FIT3105 Biometric based authentication and identity management
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Biometrics.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
R ETINAL S CANNING by the Man, the Myth, the Legend Justin Thompson.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Black Ice Security Services
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Unit 2 Scanning Techniques
access identification
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
Biometric Security Palm Vein Technology
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
Government Security Seriousness
BSC Biometric Security System
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Campbell’s Security Co. ™
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Access Identification © 2014 Project Lead The Way, Inc.Human Body Systems

Mission Statement The mission of AID is to ensure the safety of valuable items and protection of businesses possessed by exceptional individuals by the use of biometrics and other identification devices.

Scenario A government agency interested in protecting the nation’s secrets. The Basics Money is no object The system must be impenetrable

The Plan Iris scan Radioactive dye drink fountain Gait test Vein geometry scan *If any step is failed, access is completely denied immediately

IRIS SCAN The scanner is installed on the outermost indestructible door. The scanner takes advantage of the unique variations and features of the iris, the colored ring The system locates the inner and outer edge of the iris, shoots out Infrared and visible lights, divides the Iris into hundreds of sections, and Verifies all sections match the Database.

Radioactive Dye Drink Administered after iris scan Much like the dye used in MRIs Will be useful later in the identification

Gait Measure The Gait Measure Identifier is located right after the radioactive fountain drink The Gait technology measures human gait by body contour, motion, speed and time First data must be collected from the individuals in the system. It also helps to have the background be as simple as possible to provide the highest level of recognition. Additionally selection of an appropriate viewpoint, one in which the gait is observed from the side, is also important. From here, through a process called background subtraction, the object or gait is separated from the background noise. Next the specific markers of the identification scheme are removed from the gait data. These are compared with the database in hopes of a positive recognition.

Vein Geometry The last step, after the gait measurer. Scanner maps out all of the unique blood vessels in the forearm The scanner emits magnetic detectors, much like an MRI, that recognizes the radioactive dye now running through the blood vessels. These are compiled and compared to the database.

Sarah Jean-Presidential secretary “These series of biometrics have really helped to crack down on identity theft. About a month or two ago a criminal master mind for Japan had everything he needed to get by our simple fingerprint scan. He even knocked out our biggest maddest guards with anesthesia to get to the nations secrets! We never caught the guy but when we turned to more than one system of biometrics and we got him! If he really thought he was going to get past our gait measure he was wrong! Thanks Haley and Careana!”

It would be impossible for someone to beat this system. Each test alone is near impossible to pass on its own. Iris scan can only be passed by using a dead person’s eye. To duplicate someone's walk is highly impossible. A persons walk is due to what there body has been through over the years and unless you are someone who has been by that person’s side their whole life….IMPOSSIBLE! Also the sensors on the floor will detect if there are more than one person crossing the room.

IMPOSSIBLE CON. To get past the vein geometry is hard. The vein geometry takes a look at someone's inner veins. Unless you are God….IMPOSSIBLE! Also a dead person cannot be used to pass this because the blood must be flowing to move the radioactive dye. STEALING SOMEONE’S IDENTITY IN THIS CASE IS…..

~The nations secrets are above privacy. ~Any measure that is reasonable may be taken into consideration when in regards the US’s undisclosed information

Works Cited Access Excellence [Internet] [accessed 2008 Oct 1]. Available from: isscan.php isscan.php Biometrics [Internet] Michigan State University: [updated 2008; accessed 2008 Oct 1]. Available from: cse.msu.edu/index.html