10
LOCK IT UP! Katie, Ashley, and Paola KAP SECURITY

Lock it up!

Embed Size (px)

DESCRIPTION

Kap security. Lock it up!. Katie, Ashley, and Paola. Security Plan. Iris Recognition, Fingerprint, and Voice Recognition When people enter the bank we will have them get an iris scan plus a fingerprint scan - PowerPoint PPT Presentation

Citation preview

Page 1: Lock it up!

LOCK IT UP!

Katie, Ashley, and Paola

KAP SECURITY

Page 2: Lock it up!

SECURITY PLAN

Iris Recognition, Fingerprint, and Voice Recognition

When people enter the bank we will have them get an iris scan plus a fingerprint scan

When people pull up to a drive-thru ATM, we will have them scan their finger. If the customer wants to take out more than $400, they will have to come into the building for security purposes.

Over the phone we will have the customer do a voice recognition before being able to access their account

Page 3: Lock it up!

THE SCIENCE: IRIS RECOGNITION

The scanner takes a picture of the eye and analyzes specific ridges and color patterns for unique points of the eye. These points are then translated into a code and the image is deleted and the code is stored. For the next visit the individuals eye will be compared to the codes in the system.

It can be used while wearing contact lenses or eye glasses

Involves no physical contact with the scanner Works with individuals from different ethnic

groups

Page 4: Lock it up!

THE SCIENCE: FINGERPRINTS

Captures an image of ridges and furrows of the fingerprint and pinpoints the unique pattern which is then turned into a code, and the code is stored in the system

Every individual has a different fingerprint pattern

Page 5: Lock it up!

THE SCIENCE: VOICE RECOGNITION

The system analyzes sound, pattern and rhythm of speech with a numerical score, and is then matched with similar scores

Doesn’t work as well if customer is sick or there is a lot of background noise

Depending on how sophisticated voice verification system is

Page 6: Lock it up!

ACCURACY

Iris scan- Most accurate Fingerprints- 95% - 98% accurate Voice recognition- not as accurate due to

background noises and physical condition

Page 7: Lock it up!

SUCCESS STORY

Fingerprint scans have been used at schools Iris scanners have been used to secure

border checkpoints and nuclear power plants Voice recognition has been used for banks

Page 8: Lock it up!

CAN IT BE BEAT?

Iris scans- colored contacts, high resolution photo of someone’s eye

Fingerprints- fake fingerprints using gelatin, cutting off someone’s finger

Voice recognition- it would depend on how accurate and sophisticated the voice- verification system is

Page 9: Lock it up!

ISSUES OF PRIVACY

People think that the image that is taken of their fingerprint, eye, or face is stored and can be used for other purposes such as surveillance and forensic data bases

But what they don’t know is that the code is what is stored not the image that is taken.

Page 10: Lock it up!

CITATIONS Images: https://mail-attachment.googleusercontent.com/attachment/u/

0/?ui=2&ik=5ad2661af8&view=att&th=13a0d33fd782c2f4&attid=0.1&disp=inline&realattid=f_h7nde2pr0&safe=1&zw&saduie=AG9B_P_sSLd56gpemyQ0VIwgrAJ3&sadet=1348841631576&sads=3VpVzEB8b27ozo5IqYomQ2dd3zk

http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=Gpyjh4KSGSsjoM:&imgrefurl=http://conceptknot.com/conceptflow/%3Fp%3D5&docid=knY1OG0j8HQ7GM&imgurl=http://www.conceptknot.com/images/posts/eye7.jpg&w=403&h=400&ei=u7BlUOzhGoj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=1075&vpy=272&dur=38&hovh=224&hovw=225&tx=135&ty=114&sig=109210131703254426016&page=3&tbnh=139&tbnw=147&start=43&ndsp=24&ved=1t:429,r:23,s:43,i:367

http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=eBC-GrOSS8E_WM:&imgrefurl=http://www.isleofwightsheriffsoffice.com/records.html&docid=tjlkby9VVvKq8M&imgurl=http://www.isleofwightsheriffsoffice.com/images/finger.jpg&w=250&h=384&ei=A7FlUMnME4v3qQGczoCICQ&zoom=1&iact=rc&dur=328&sig=109210131703254426016&page=2&tbnh=133&tbnw=92&start=27&ndsp=33&ved=1t:429,r:0,s:27,i:229&tx=50&ty=71

http://www.google.com/imgres?hl=en&biw=1366&bih=636&tbm=isch&tbnid=2jtrj8j0BcB9gM:&imgrefurl=http://www.findbiometrics.com/voice-recognition/&docid=-dcp19Idae9q8M&imgurl=http://www.findbiometrics.com/biometric-images/voice-recognition.jpg&w=200&h=195&ei=orFlULXiMYj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=667&vpy=210&dur=351&hovh=140&hovw=144&tx=62&ty=86&sig=109210131703254426016&page=1&tbnh=129&tbnw=132&start=0&ndsp=21&ved=1t:429,r:3,s:0,i:145

Websites: Tynan, Dan. "Biometrics: from Reel to Real." PCWorld. N.p., 18

May 2005. Web. 28 Sept. 2012. <http://www.pcworld.com/article/120889/article.html>.

Wilson, Tracy V. "How Biometrics Works." How Stuff Works. N.p., n.d. Web. 28 Sept. 2012. <http://science.howstuffworks.com/biometrics.html>.

Podio, Fernando L., and Jeffery S. Dunn. "Biometric Authentication Technology: from the Movies to Your Desktop." N.p., n.d. Web. 28 Sept. 2012. <http://www.cab.org.in/ICTPortal/Lists/Knowledge%20Bank/Attachments/44/Biometricsfromthemovies_23_12_2007.pdf>