lock it up n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Lock it up! PowerPoint Presentation
Download Presentation
Lock it up!

Loading in 2 Seconds...

play fullscreen
1 / 10

Lock it up! - PowerPoint PPT Presentation


  • 191 Views
  • Uploaded on

Kap security. Lock it up!. Katie, Ashley, and Paola. Security Plan. Iris Recognition, Fingerprint, and Voice Recognition When people enter the bank we will have them get an iris scan plus a fingerprint scan

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Lock it up!' - mayes


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
lock it up

Kap security

Lock it up!

Katie, Ashley, and Paola

security plan
Security Plan
  • Iris Recognition, Fingerprint, and Voice Recognition
  • When people enter the bank we will have them get an iris scan plus a fingerprint scan
  • When people pull up to a drive-thru ATM, we will have them scan their finger. If the customer wants to take out more than $400, they will have to come into the building for security purposes.
  • Over the phone we will have the customer do a voice recognition before being able to access their account
the science iris recognition
The Science: Iris Recognition
  • The scanner takes a picture of the eye and analyzes specific ridges and color patterns for unique points of the eye. These points are then translated into a code and the image is deleted and the code is stored. For the next visit the individuals eye will be compared to the codes in the system.
  • It can be used while wearing contact lenses or eye glasses
  • Involves no physical contact with the scanner
  • Works with individuals from different ethnic groups
the science fingerprints
The Science: Fingerprints
  • Captures an image of ridges and furrows of the fingerprint and pinpoints the unique pattern which is then turned into a code, and the code is stored in the system
  • Every individual has a different fingerprint pattern
the science voice recognition
The Science: Voice Recognition
  • The system analyzes sound, pattern and rhythm of speech with a numerical score, and is then matched with similar scores
  • Doesn’t work as well if customer is sick or there is a lot of background noise
  • Depending on how sophisticated voice verification system is
accuracy
Accuracy
  • Iris scan- Most accurate
  • Fingerprints- 95% - 98% accurate
  • Voice recognition- not as accurate due to background noises and physical condition
success story
Success Story
  • Fingerprint scans have been used at schools
  • Iris scanners have been used to secure border checkpoints and nuclear power plants
  • Voice recognition has been used for banks
can it be beat
Can It Be Beat?
  • Iris scans- colored contacts, high resolution photo of someone’s eye
  • Fingerprints- fake fingerprints using gelatin, cutting off someone’s finger
  • Voice recognition- it would depend on how accurate and sophisticated the voice- verification system is
issues of privacy
Issues of Privacy
  • People think that the image that is taken of their fingerprint, eye, or face is stored and can be used for other purposes such as surveillance and forensic data bases
  • But what they don’t know is that the code is what is stored not the image that is taken.
citations
Citations
  • Images:
  • https://mail-attachment.googleusercontent.com/attachment/u/0/?ui=2&ik=5ad2661af8&view=att&th=13a0d33fd782c2f4&attid=0.1&disp=inline&realattid=f_h7nde2pr0&safe=1&zw&saduie=AG9B_P_sSLd56gpemyQ0VIwgrAJ3&sadet=1348841631576&sads=3VpVzEB8b27ozo5IqYomQ2dd3zk
  • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=Gpyjh4KSGSsjoM:&imgrefurl=http://conceptknot.com/conceptflow/%3Fp%3D5&docid=knY1OG0j8HQ7GM&imgurl=http://www.conceptknot.com/images/posts/eye7.jpg&w=403&h=400&ei=u7BlUOzhGoj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=1075&vpy=272&dur=38&hovh=224&hovw=225&tx=135&ty=114&sig=109210131703254426016&page=3&tbnh=139&tbnw=147&start=43&ndsp=24&ved=1t:429,r:23,s:43,i:367
  • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=eBC-GrOSS8E_WM:&imgrefurl=http://www.isleofwightsheriffsoffice.com/records.html&docid=tjlkby9VVvKq8M&imgurl=http://www.isleofwightsheriffsoffice.com/images/finger.jpg&w=250&h=384&ei=A7FlUMnME4v3qQGczoCICQ&zoom=1&iact=rc&dur=328&sig=109210131703254426016&page=2&tbnh=133&tbnw=92&start=27&ndsp=33&ved=1t:429,r:0,s:27,i:229&tx=50&ty=71
  • http://www.google.com/imgres?hl=en&biw=1366&bih=636&tbm=isch&tbnid=2jtrj8j0BcB9gM:&imgrefurl=http://www.findbiometrics.com/voice-recognition/&docid=-dcp19Idae9q8M&imgurl=http://www.findbiometrics.com/biometric-images/voice-recognition.jpg&w=200&h=195&ei=orFlULXiMYj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=667&vpy=210&dur=351&hovh=140&hovw=144&tx=62&ty=86&sig=109210131703254426016&page=1&tbnh=129&tbnw=132&start=0&ndsp=21&ved=1t:429,r:3,s:0,i:145
  • Websites:
  • Tynan, Dan. "Biometrics: from Reel to Real." PCWorld. N.p., 18 May 2005. Web. 28 Sept. 2012. <http://www.pcworld.com/article/120889/article.html>.
  • Wilson, Tracy V. "How Biometrics Works." How Stuff Works. N.p., n.d. Web. 28 Sept. 2012. <http://science.howstuffworks.com/biometrics.html>.
  • Podio, Fernando L., and Jeffery S. Dunn. "Biometric Authentication Technology: from the Movies to Your Desktop." N.p., n.d. Web. 28 Sept. 2012. <http://www.cab.org.in/ICTPortal/Lists/Knowledge%20Bank/Attachments/44/Biometricsfromthemovies_23_12_2007.pdf>