THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY

  • 29 views
Uploaded on

The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring …

The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring information protection, then Thumb Access is what you need.
Thumb Access links you to all your accounts whether on SNS, Chat Messengers, E-mail or with your Bank through one medium – your thumbprint. Like is widely known, only the human thumbprint is unique to every individual as no two persons have the same finger-print features. This makes Thumb Access far safer than passwords which are prone to hacking, formatting or can even be forgotten.
Thumb Access works in a way that specifically eliminates any fears of intrusion to one’s protected information. All that protection comes without cramming or writing passwords; it simply demands registering your thumbprint with every account you own. Now you can be sure that your next mail, tweet, chat message or even bank transaction is just a thumbprint away
How does it work?
The software comes pre-loaded on mobile phones that operate touch-capabilities, i.e. touchscreens, as part of the System Software. Once purchased and ready to use, the user is required to register his or her thumbprint (preferably the right thumb) as part of the start-up procedures.
The user also is required to register his or her SNS, Chat Messenger, E-mail as well as Bank accounts with the thumbprint as an access code. Once this stage is completed, regular settings will follow. As a result, the thumbprint will also serve as the phone code covering the various codes that can be used on mobile phones.
So when you need to unlock your phone, view your mails, access your SNS or chat, your thumbprint will be requested for as your pre-registered access code. No password required! Now you can open as many accounts you want on the variety of sites as you won’t need to rack your brain over a forgotten password.
Also, the thumbprint is saved on a central database along with your phone details for retrieval and phone security purposes.
Can I change settings on my Thumb Access?
Sure enough, the application is absolutely user-friendly permitting controlled changes in settings for customer satisfaction. Any change in settings will demand the pre-registered thumbprint so as to prevent intrusion. With this and more, you have it all the more secure.
How does the App improve security?
As a user, your accounts are safe against unwanted intrusions while your phone accessibility is controlled. You also get to track and find the location of your phone if lost or stolen thus going a long way in helping Police Investigations.
Since your phone will demand access code every two hours and for every attempt at unlocking (Preset), any unauthorized use through theft leaves the suspect without any means of using or changing any settings. This technology will also curb phone theft as stealing an access-protected phone will be unappealing. THANK YOU

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
29
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • What are 21 st century skills? True technology and media literacy Effective communication Critical thinking Problem solving And…collaboration The best learning environment to acquire these skills is an “eLearning” environment Access to ICT (Information and Communication Technology) has emerged as a key strategy to take education to a new level – by creating effective eLearning environments
  • [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  • [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  • [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  • Whether you’re introducing or expanding ICT in your schools, successful implementation takes several key components working together: Strong technology Connectivity Professional development Improved learning methods and Digital curriculum All of these contribute to an eLearning environment where 21st century skills flourish and students thrive. Technology: PCs, servers, PDA/handhelds, cell phones, iPods*. Also: Wired communications and computing networks; wireless communications and computing networks. Connectivity: Wired or wireless. Wi-Fi and WiMAX are optimum. Professional development: Many flavors available. Intel’s Teach to the Future program offers professional development for teachers in 35 countries today. Improved learning methods: Student-centric learning, project-based learning, group collaboration, goal of developing higher-order thinking skills. Digital curriculum: Includes digital content, but is not the same thing as digital content. A digital curriculum is a teaching/learning approach that assumes that technology and connectivity are involved, and that takes advantage of those. So lesson plans are different, resources are different, AND the content is digital (from the Net, multimedia, CD-ROM, etc. – electronic-based, not paper-based).

Transcript

  • 1.   RCCG LP25 GIICT WINNERS THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY TECHNOVATION CHALLENGE Digital inclusion for this generation and the nextThe RCCG LP25 Technovation
  • 2. Technology in 21st Century Skills • We are a team of young teenage girls from under the Teens Church arm one of the Provincial Headquarters of the Redeemed Christian Church of God in Lagos and we are excellence-oriented people running with a globally-impactful vision. Our team name is RCCG LP25 GIICT WINNERS and the names of our team members are as follows:- Digital inclusion for this generation and the next
  • 3. Importance of Technology in Schools As technology is bound to rule our present and future, it is good to obtain a know how of the technological reforms at the earliest. Children learn faster and can adapt to changes relatively easily. If they are trained during their school years, they have high chances of becoming experts in technology. An early beginning is always beneficial in the long run. When we know that technology is bound to be a part of their future, it is best to introduce them to it during school life. Instead of seeing them, struggle with learning later in life, it is advisable to give them a basic idea of the technological reforms Digital inclusion for this generation and the next
  • 4. PRESENTED BYUramu Maryann, 17Ekechukwu Rachel, 17Akingba Gladys, 14Edozie Oluchi, 14Ogunleye Oluwatosin, 18 Digital inclusion for this generation and the next
  • 5. Introducing the Thumb Access Technology The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring information protection, then Thumb Access is what you need. Digital inclusion for this generation and the next
  • 6. Introducing the Thumb Access Technology Thumb Access links you to all your accounts whether on SNS, Chat Messengers, E-mail or with your Bank through one medium – your thumbprint. Like is widely known, only the human thumbprint is unique to every individual as no two persons have the same finger-print features. This makes Thumb Access far safer than passwords which are prone to hacking, formatting or can even be Digital inclusion for this forgotten. generation and the next
  • 7. Introducing the Thumb Access Technology Thumb Access works in a way that specifically eliminates any fears of intrusion to one’s protected information. All that protection comes without cramming or writing passwords; it simply demands registering your thumbprint with every account you own. Now you can be sure that your next mail, tweet, chat message or even bank transaction is just a thumbprint away. Digital inclusion for this generation and the next
  • 8. Technology Environments Digital inclusion for this generation and the next
  • 9. THUMBS ON – ACCESS ALL YOURACCOUNTS SAME WAY, SAFEST WAY Fig a Fig b Fig e Fig d Fig c Digital inclusion for this generation and the next
  • 10. How does it work? The software comes pre-loaded on mobile phones that operate touch-capabilities, i.e. touchscreens, as part of the System Software. Once purchased and ready to use, the user is required to register his or her thumbprint (preferably the right thumb) as part of the start-up procedures. Digital inclusion for this generation and the next
  • 11. How does it work? The user also is required to register his or her SNS, Chat Messenger, E-mail as well as Bank accounts with the thumbprint as an access code. Once this stage is completed, regular settings will follow. As a result, the thumbprint will also serve as the phone code covering the various codes that can be used on mobile phones. Digital inclusion for this generation and the next
  • 12. How does it work? Sowhen you need to unlock your phone, view your mails, access your SNS or chat, your thumbprint will be requested for as your pre- registered access code. No password required! Now you can open as many accounts you want on the variety of sites as you won’t need to rack your brain over a forgotten password. Digital inclusion for this generation and the next
  • 13. How does it work?Also, the thumbprint is saved on a central database along with your phone details for retrieval and phone security purposes. Digital inclusion for this generation and the next
  • 14. Can I change settings on my Thumb Access? Sure enough, the application is absolutely user-friendly permitting controlled changes in settings for customer satisfaction. Any change in settings will demand the pre-registered thumbprint so as to prevent intrusion. With this and more, you have it all the more secure. Digital inclusion for this generation and the next
  • 15. How does the App improve security? Asa user, your accounts are safe against unwanted intrusions while your phone accessibility is controlled. You also get to track and find the location of your phone if lost or stolen thus going a long way in helping Police Investigations. Digital inclusion for this generation and the next
  • 16. How does the App improve security? Since your phone will demand access code every two hours and for every attempt at unlocking (Preset), any unauthorized use through theft leaves the suspect without any means of using or changing any settings. This technology will also curb phone theft as stealing an access-protected phone will be unappealing. Since the application will be operating under system software, it will not be Digital inclusion for this liable to formatting. generation and the next
  • 17. How does the App improve security? Sincethe phone will only be sold at designated retail centers, road-side sale of stolen phones will be considered illegal and termed as a criminal act. Robbery suspect will also be tracked using the stolen phone and it can be found even after being discarded. Change of SIM cards will be irrelevant to decoding or unlocking the phone. Digital inclusion for this generation and the next
  • 18. How does the App improve security? Country security can be greatly improved through linking it with the appropriate database thus giving possible monitoring of migrations. The user can also set the thumbprint as a permission code for switching of the phone. In order to preserve necessary information, time changes will immediately occur with a change in time zones. All users need to do is to notify the phone/software manufacturers on the theft of their phones, information on the phone location will be Digital inclusion for this immediately sent to the user. generation and the next
  • 19. Can I use/find the software on any phone?Thumb Access is only available on touch-enabled phones and will be available for Symbian OS, Windows OS, Web OS, Android OS, i-OS, Blackberry OS and other collaborating touch-enabled phone categories. Digital inclusion for this generation and the next
  • 20. THANK YOU SEE YOU ALL AT THE TOP Thank You for Listening! IT TAKES A GOOD PROCESS TO BRING OUT A GOOD PRODUCT