New Opportunities with Wearable TechnologyMatthew Morey
As the Pebble watch and other wearable devices become ubiquitous new opportunities for innovative user interaction and functionality are being created. This presentation, by ChaiONE Senior Developer Matthew Morey, will look at the technical capabilities of the current leading wearable devices and how those capabilities can be leveraged to create unique user experiences, especially when paired with smart phones.
Why you should care about the wearable technology market? What are the technical limits of the current available wearable devices? How to integrate the Pebble with iOS to achieve unique user functionality not possible by each device alone?
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
Pill camera is an application of nanotechnology used in medicine to diagnose the disease particularly the small intestine and it is an alternative to endoscopy.
New Opportunities with Wearable TechnologyMatthew Morey
As the Pebble watch and other wearable devices become ubiquitous new opportunities for innovative user interaction and functionality are being created. This presentation, by ChaiONE Senior Developer Matthew Morey, will look at the technical capabilities of the current leading wearable devices and how those capabilities can be leveraged to create unique user experiences, especially when paired with smart phones.
Why you should care about the wearable technology market? What are the technical limits of the current available wearable devices? How to integrate the Pebble with iOS to achieve unique user functionality not possible by each device alone?
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
Pill camera is an application of nanotechnology used in medicine to diagnose the disease particularly the small intestine and it is an alternative to endoscopy.
Wearables devices market and technologyKevin Huang
What is wearable technology?
Simply put, it’s technology that you incorporate into things you wear on a day-to-day basis, and it could be anything from a smart watch, augmented reality glasses, or even a personal health monitor in the form of a bracelet.
The idea is that technology will increasingly become more part of our daily lives, and it will become less intrusive, as it will be part of our clothing, and sometimes even part of our bodies!
Wearable tech presents a fascinating field to study. I have conducted some researches and hope you can also learn more about this high growth market.
The wearable technology market today spans across the fashion, medicine and technology industries. This presentation analyzes current trends across stye three industries and outline where the future of such products may be headed towards.
This report discusses the current and future trends in wearable technology ( wearables / wearable computer). Further, major drivers of successful wearables has been highlighted and 6 products have been compared as against each of the wearables.
4/7/2008 1
BBiioommeettrriicc TTeecchhnnoollooggyy AApppplliiccaattiioonn MMaannuuaall
VVoolluummee 22:: AAppppllyyiinngg BBiioommeettrriiccss [[DDrraafftt VVeerrssiioonn]]
CCoommppiilleedd aanndd PPuubblliisshheedd bbyy::
NNaattiioonnaall BBiioommeettrriicc SSeeccuurriittyy PPrroojjeecctt
WWiinntteerr 22000088
4/7/2008 2
Biometric Technology Application Manual (BTAM)
VOLUME 2: Applying Biometrics
About the National Biometric Security Project ...................................................... 3
Abstract 4
FORWARD............................................................................................................. 8
Section 9 – Biometrics Applications..................................................................... 9
Section 10 – System Requirements and Selection ................................................ 23
Section 11 – System Engineering, Integration, and Implementation.................... 64
Section 12 – Operations and Management ........................................................... 79
Section 13 – Maintenance, Services, and Warranties ........................................... 85
Section 14 – Training............................................................................................ 88
Case Studies
Case Study A – India: Ration Card Program ....................................................... 97
Case Study B – State of Illinois: Driver Licensing............................................ 103
Case Study E – University of Georgia: Student ID/Access Control.................. 115
Case Study F – St. Vincent Hospital: Desktop Computer Access ..................... 118
Case Study G – Beaumont Hospital: Medical Records Security ........................ 122
Case Study H – Pinellas County Sheriff’s Office: Arrestee Identification......... 127
Case Study I – U.A.E.: Iris Expellees Tracking and Border Control System... 133
Appendix A – Biometric Selection/Application Checklist ................................. 138
Appendix B – Miscellaneous Resources............................................................. 139
Appendix C – Biometric Publications ................................................................ 146
Appendix D – Education/Training Resources .................................................... 170
Bibliography and References .............................................................................. 173
Acknowledgements............................................................................................. 176
4/7/2008 3
About the National Biometric Security Project
The National Biometric Security Project (NBSP) is a tax exempt, nonprofit 501(c)(3)
organization incorporated and headquartered in Washington, DC. Its mission is to
enhance the practice and effectiveness of identity assurance in government and the
private sector, through the application of biometrics, for the purpose .
This presentation describes coordination of federal biometric and identity management activities, and was given at the 2008 Biometric Consortium Conference.
The article "DoD Coordination and Collaboration on Biometric Standards Activities" written by me is published in the January/March 2009 issue of the Defense Standardization Program Journal.
What can local government use to help manage IT security threats and IT losses? NIST has developed standards that are recommended for local governments.
Wearables devices market and technologyKevin Huang
What is wearable technology?
Simply put, it’s technology that you incorporate into things you wear on a day-to-day basis, and it could be anything from a smart watch, augmented reality glasses, or even a personal health monitor in the form of a bracelet.
The idea is that technology will increasingly become more part of our daily lives, and it will become less intrusive, as it will be part of our clothing, and sometimes even part of our bodies!
Wearable tech presents a fascinating field to study. I have conducted some researches and hope you can also learn more about this high growth market.
The wearable technology market today spans across the fashion, medicine and technology industries. This presentation analyzes current trends across stye three industries and outline where the future of such products may be headed towards.
This report discusses the current and future trends in wearable technology ( wearables / wearable computer). Further, major drivers of successful wearables has been highlighted and 6 products have been compared as against each of the wearables.
4/7/2008 1
BBiioommeettrriicc TTeecchhnnoollooggyy AApppplliiccaattiioonn MMaannuuaall
VVoolluummee 22:: AAppppllyyiinngg BBiioommeettrriiccss [[DDrraafftt VVeerrssiioonn]]
CCoommppiilleedd aanndd PPuubblliisshheedd bbyy::
NNaattiioonnaall BBiioommeettrriicc SSeeccuurriittyy PPrroojjeecctt
WWiinntteerr 22000088
4/7/2008 2
Biometric Technology Application Manual (BTAM)
VOLUME 2: Applying Biometrics
About the National Biometric Security Project ...................................................... 3
Abstract 4
FORWARD............................................................................................................. 8
Section 9 – Biometrics Applications..................................................................... 9
Section 10 – System Requirements and Selection ................................................ 23
Section 11 – System Engineering, Integration, and Implementation.................... 64
Section 12 – Operations and Management ........................................................... 79
Section 13 – Maintenance, Services, and Warranties ........................................... 85
Section 14 – Training............................................................................................ 88
Case Studies
Case Study A – India: Ration Card Program ....................................................... 97
Case Study B – State of Illinois: Driver Licensing............................................ 103
Case Study E – University of Georgia: Student ID/Access Control.................. 115
Case Study F – St. Vincent Hospital: Desktop Computer Access ..................... 118
Case Study G – Beaumont Hospital: Medical Records Security ........................ 122
Case Study H – Pinellas County Sheriff’s Office: Arrestee Identification......... 127
Case Study I – U.A.E.: Iris Expellees Tracking and Border Control System... 133
Appendix A – Biometric Selection/Application Checklist ................................. 138
Appendix B – Miscellaneous Resources............................................................. 139
Appendix C – Biometric Publications ................................................................ 146
Appendix D – Education/Training Resources .................................................... 170
Bibliography and References .............................................................................. 173
Acknowledgements............................................................................................. 176
4/7/2008 3
About the National Biometric Security Project
The National Biometric Security Project (NBSP) is a tax exempt, nonprofit 501(c)(3)
organization incorporated and headquartered in Washington, DC. Its mission is to
enhance the practice and effectiveness of identity assurance in government and the
private sector, through the application of biometrics, for the purpose .
This presentation describes coordination of federal biometric and identity management activities, and was given at the 2008 Biometric Consortium Conference.
The article "DoD Coordination and Collaboration on Biometric Standards Activities" written by me is published in the January/March 2009 issue of the Defense Standardization Program Journal.
What can local government use to help manage IT security threats and IT losses? NIST has developed standards that are recommended for local governments.
Every CISO should know how to create and implement information security policies. The best approach is defined in the ISO 27001 standard and presented in the attached presentation, "ISMS Documented Information"
Contingency Planning Guide for Federal Information Systems Maria.docxmaxinesmith73660
Contingency Planning Guide for Federal Information Systems
Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean Gallup David Lynes
NIST Special Publication 800-34 Rev. 1
Contingency Planning Guide for Federal Information Systems
Marianne Swanson Pauline Bowen Amy Wohl Phillips Dean Gallup David Lynes
May 2010
U.S. Department of Commerce
Gary Locke, Secretary
National Institute of Standards and Technology
Patrick D. Gallagher, Director
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.
There are references in this publication to documents currently under development by NIST in accordance with responsibilities assigned to NIST under the Federal Information Security Management Act of 2002. The methodologies in this document may be used even before the completion of such companion documents. Thus, until such time as each document is completed, current requirements, guidelines, and procedures (where they exist) remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new documents by NIST. Individuals are also encouraged to review the public draft documents and offer their comments to NIST.
All NIST documents mentioned in this publication, other than the ones noted above, are available at http://csrc.nist.gov/publications.
National Institute of Standards and Technology Special Publication 800-34 Natl. Inst. Stand. Technol. Spec. Publ. 800-34, 150 pages (May 2010) CODEN: NSPUE2
CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.
ii
CONTINGENCY PLANNING GUIDE FOR FEDERAL INFORMATION SYSTEMS
Authority
This document has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its st.
Similar to Role of Biometric Standards in IdM (20)
Contingency Planning Guide for Federal Information Systems Maria.docx
Role of Biometric Standards in IdM
1. Role of Biometric Standards in Interoperability and Data Sharing Identity Protection and Management Conference Mr. Benji Hutchinson April 2009 UNCLASSIFIED UNCLASSIFIED
2.
3.
4.
5. BTF Led Biometric Standards Activities UNCLASSIFIED Voting members, Editors, Technical Contributors DoD Biometric Standards Working Group NSTC SC on Biometrics and IdM INCITS M1 & M1 TGs ISO/IEC JTC1 SC37 & SC37 WGs OASIS Chair and Coordinate Champion (Lead) and Coordinate Members of U.S. Expert Delegation, Editors, Technical Contributors Provide Technical Expertise DISR Security Information Assurance and Cryptography Technical Working Group NSTC SC Biometrics and IdM SCA WG DHS BCG
6.
7.
8.
9.
10.
11.
12.
13.
14.
15. Mr. Dale Hapeman BTF/Booz Allen Hamilton 304-326-3029 [email_address] MAJ Craig White Branch Chief Standards Branch [email_address] Dr. Bob Yen BTF/Booz Allen Hamilton 703-984-0434 [email_address] Mr. Alexander Montgomery BTF/Booz Allen Hamilton 703-607-1959 [email_address] Mr. Gregory Zektser BTF/Booz Allen Hamilton 703-984-0432 [email_address] Mr. Benji Hutchinson BTF/Booz Allen Hamilton 703-607-1951 [email_address] Mr. William Zimmerman Division Chief Capabilities Integration Division [email_address] Mr. Don Waymire BTF/Booz Allen Hamilton 703-984-0429 [email_address] BTF Standards Branch Contact Information UNCLASSIFIED
Editor's Notes
The SIAC TWG hopes to gain an understanding of how biometrics fits into the greater DoD Information Assurance enterprise. This meeting will also set the stage for growth into identity management standards that leverage biometrics.
DoD
DoD has a close working relationship with DISA. DoD has 4 votes in INCITS M1: BTF has 1, DISA has 1, and 2 are unclaimed. This is an opportunity for a DoD entity to get involved in the development of biometric standards and increase DoD’s influence.
How do we prioritize standards development projects? Initially M1 tries to initiated an international project, instead of starting a national project. In the past, M1 started a national project, then focused on international.
BTF Standards Status and Activities Update – Consolidated view of all BTF and BSWG standards activities – published quarterly. BTF Standards Development Status Update – Comprehensive list of DISR-approved biometric standards, proposed DISR standards, published standards, and standards projects currently under development in various bodies – published quarterly.