Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology


  1. 1. Michael Rourke Natalie Kalas Sean Stockley Vivian Graubard
  2. 2. Biometrics Basics <ul><li>Definitions: </li></ul><ul><ul><li>The collection, analysis, and management of data in biology. </li></ul></ul><ul><ul><li>Science of recognizing an individual based upon: </li></ul></ul><ul><ul><ul><li>One or more intrinsic physical </li></ul></ul></ul><ul><ul><ul><li>Behavioral traits. </li></ul></ul></ul>
  3. 3. Classification of Some Biometric Traits
  4. 4. Common Questions Biometrics Answers <ul><li>Is this person who he says he is? </li></ul><ul><li>Has this person been banned from this facility? </li></ul><ul><li>Should this person be allowed into this area? </li></ul><ul><li>Is this person wanted by the government? </li></ul><ul><li>Has this person been here before? </li></ul>
  5. 5. Functions of Biometric Systems <ul><li>A biometric system can provide the following functions: </li></ul><ul><ul><ul><li>Verification </li></ul></ul></ul><ul><ul><ul><li>Identification </li></ul></ul></ul><ul><ul><ul><li>Screening </li></ul></ul></ul>
  6. 6. Fingerprint Scanning <ul><li>Unique to each individual </li></ul><ul><li>Ensure the consumers’ identity </li></ul><ul><li>Businesses can protect customers </li></ul><ul><li>Scanners compare fingerprints to a database </li></ul><ul><li>Scanners are inexpensive </li></ul><ul><li>Personalized </li></ul>
  7. 7. <ul><li>Scanners can be fooled: MythBusters </li></ul><ul><li> </li></ul><ul><li>Iris scanners should be used along with fingerprint scanners </li></ul><ul><li>Ensures consumer identity safety </li></ul>
  8. 8. Iris Scanning <ul><li>What is iris scanning? </li></ul><ul><li>Advantages to iris scanning </li></ul><ul><li>Iris scanning in the United States </li></ul><ul><li>Iris scanning on a global level </li></ul><ul><li>Effects on business </li></ul><ul><ul><li>Cost reduction </li></ul></ul><ul><ul><li>Time efficient </li></ul></ul>
  9. 9. Use of Biometrics Today <ul><li>Border Control between Israel and Palestine </li></ul><ul><li>ATM security in Colombia, India, and Japan </li></ul><ul><li>Airport Security- biometrics in passports </li></ul>
  10. 10. Summary <ul><li>Cost Effective </li></ul><ul><li>Passwords cannot be easily lost or shared </li></ul><ul><li>Personalized to each individual </li></ul><ul><li>Multiple Biometric systems ensure proper identification and minimize the likelihood of false verification </li></ul>
  11. 11. Works Cited <ul><li>“ About Identity Theft.” Fighting Back Against Identity Theft. FTC. 23 Nov. 2008 < >. </li></ul><ul><li>Anderson, Nate. “Iris Scanners Enroll in Elementary School.” Ars Technica. 24 Feb. 2006. 23 Nov. 2008 < >. </li></ul><ul><li>Frank, Thomas. “US is Building Database on Iraqis.” USA Today 12 July 2007, World ed. 23 Nov. 2008 < >. </li></ul><ul><li>Freifeld, Karen. “Identity Thief Targets Wealthy Americans, Gets Prison .” Bloomberg News 19 Nov. 2008, Eastern ed. 23 Nov. 2008 < >. </li></ul><ul><li>Harmel, Karen. “Walt Disney World: The Government’s Tomorrowland.” Liberty vs. Security. 1 Sept. 2006. 23 Nov. 2008 < >. </li></ul><ul><li>Harris, Tom. “Fingerprint Basics.” How Stuff Works. Discovery Channel. 23 Nov. 2008 < >. </li></ul><ul><li>“ High Tech Security System.” Mythbusters. Discovery Channel. Silver Spring. 25 June 2006. Transcript. Metacafe. 23 Nov. 2008 < >. </li></ul>