1 / 10

Lock it up!

Kap security. Lock it up!. Katie, Ashley, and Paola. Security Plan. Iris Recognition, Fingerprint, and Voice Recognition When people enter the bank we will have them get an iris scan plus a fingerprint scan

drew-powers
Download Presentation

Lock it up!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kap security Lock it up! Katie, Ashley, and Paola

  2. Security Plan • Iris Recognition, Fingerprint, and Voice Recognition • When people enter the bank we will have them get an iris scan plus a fingerprint scan • When people pull up to a drive-thru ATM, we will have them scan their finger. If the customer wants to take out more than $400, they will have to come into the building for security purposes. • Over the phone we will have the customer do a voice recognition before being able to access their account

  3. The Science: Iris Recognition • The scanner takes a picture of the eye and analyzes specific ridges and color patterns for unique points of the eye. These points are then translated into a code and the image is deleted and the code is stored. For the next visit the individuals eye will be compared to the codes in the system. • It can be used while wearing contact lenses or eye glasses • Involves no physical contact with the scanner • Works with individuals from different ethnic groups

  4. The Science: Fingerprints • Captures an image of ridges and furrows of the fingerprint and pinpoints the unique pattern which is then turned into a code, and the code is stored in the system • Every individual has a different fingerprint pattern

  5. The Science: Voice Recognition • The system analyzes sound, pattern and rhythm of speech with a numerical score, and is then matched with similar scores • Doesn’t work as well if customer is sick or there is a lot of background noise • Depending on how sophisticated voice verification system is

  6. Accuracy • Iris scan- Most accurate • Fingerprints- 95% - 98% accurate • Voice recognition- not as accurate due to background noises and physical condition

  7. Success Story • Fingerprint scans have been used at schools • Iris scanners have been used to secure border checkpoints and nuclear power plants • Voice recognition has been used for banks

  8. Can It Be Beat? • Iris scans- colored contacts, high resolution photo of someone’s eye • Fingerprints- fake fingerprints using gelatin, cutting off someone’s finger • Voice recognition- it would depend on how accurate and sophisticated the voice- verification system is

  9. Issues of Privacy • People think that the image that is taken of their fingerprint, eye, or face is stored and can be used for other purposes such as surveillance and forensic data bases • But what they don’t know is that the code is what is stored not the image that is taken.

  10. Citations • Images: • https://mail-attachment.googleusercontent.com/attachment/u/0/?ui=2&ik=5ad2661af8&view=att&th=13a0d33fd782c2f4&attid=0.1&disp=inline&realattid=f_h7nde2pr0&safe=1&zw&saduie=AG9B_P_sSLd56gpemyQ0VIwgrAJ3&sadet=1348841631576&sads=3VpVzEB8b27ozo5IqYomQ2dd3zk • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=Gpyjh4KSGSsjoM:&imgrefurl=http://conceptknot.com/conceptflow/%3Fp%3D5&docid=knY1OG0j8HQ7GM&imgurl=http://www.conceptknot.com/images/posts/eye7.jpg&w=403&h=400&ei=u7BlUOzhGoj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=1075&vpy=272&dur=38&hovh=224&hovw=225&tx=135&ty=114&sig=109210131703254426016&page=3&tbnh=139&tbnw=147&start=43&ndsp=24&ved=1t:429,r:23,s:43,i:367 • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=eBC-GrOSS8E_WM:&imgrefurl=http://www.isleofwightsheriffsoffice.com/records.html&docid=tjlkby9VVvKq8M&imgurl=http://www.isleofwightsheriffsoffice.com/images/finger.jpg&w=250&h=384&ei=A7FlUMnME4v3qQGczoCICQ&zoom=1&iact=rc&dur=328&sig=109210131703254426016&page=2&tbnh=133&tbnw=92&start=27&ndsp=33&ved=1t:429,r:0,s:27,i:229&tx=50&ty=71 • http://www.google.com/imgres?hl=en&biw=1366&bih=636&tbm=isch&tbnid=2jtrj8j0BcB9gM:&imgrefurl=http://www.findbiometrics.com/voice-recognition/&docid=-dcp19Idae9q8M&imgurl=http://www.findbiometrics.com/biometric-images/voice-recognition.jpg&w=200&h=195&ei=orFlULXiMYj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=667&vpy=210&dur=351&hovh=140&hovw=144&tx=62&ty=86&sig=109210131703254426016&page=1&tbnh=129&tbnw=132&start=0&ndsp=21&ved=1t:429,r:3,s:0,i:145 • Websites: • Tynan, Dan. "Biometrics: from Reel to Real." PCWorld. N.p., 18 May 2005. Web. 28 Sept. 2012. <http://www.pcworld.com/article/120889/article.html>. • Wilson, Tracy V. "How Biometrics Works." How Stuff Works. N.p., n.d. Web. 28 Sept. 2012. <http://science.howstuffworks.com/biometrics.html>. • Podio, Fernando L., and Jeffery S. Dunn. "Biometric Authentication Technology: from the Movies to Your Desktop." N.p., n.d. Web. 28 Sept. 2012. <http://www.cab.org.in/ICTPortal/Lists/Knowledge%20Bank/Attachments/44/Biometricsfromthemovies_23_12_2007.pdf>

More Related