Вы находитесь на странице: 1из 17

BMR Biometrics

Click to edit your money, saving you time. Securing Master subtitle style

4/14/12

Our Mission

Client Goals

To recognize who your customers are in order to personalize their banking experience. To protect your customers money in the most efficient, most secure way possible. To stay ahead of technology and keep your business cutting edge. Securing access to accounts Security inside the building Secure ATM transactions Secure access over the phone

4/14/12

socketsite.c om

Security Plan

ATM: Secure Automatic Transactions by a hand scanner and signature recognition software Phone: Recognize voice and location over the phone Counter: Retina scan to ensure optimum security & fingerprint match to change account settings

neweffectit.com princeton.e midlandsecurityguard.com du

4/14/12

Ensuring a safe and secure transaction.

At the ATM
4/14/12
reidsguides.com capitaloneatm.co m fitnessanddefens

Hand Scanning

Science

Works by creating and storing the templates of hand in a biometric database. These templates are accessed when a customer places his/her hand on the scanner.

The handprint is verified with the template stored in the system. Accuracy

Hand scanners are completely accurate in extreme temperatures and are accurate even when hands are dirty.

Limitations

Has to take a complete scan. It wont work if the person has no hands.

4/14/12 om/2010/08/what-is-vein-

http://atechnoblast.blogspot.c

Signature Verification

Science

A machine detects certain aspects of the users signature. These details include speed, acceleration, deceleration, stroke sequencing, length, pen pressure and timing information. The aspects of a customers signature are recorded Accuracy graphically and checked against the signatures already Signature verification is a very accurate way of confirming the associated with the account.

identity of the user when performed correctly. Difficulties lie in the user replicating his/her signature every time.
Limited by the accuracy of the pad and stylus used to write the signature. Because an individuals signature can vary from instance to instance, signature verification can have a high false rejection rate..
http://webelongtogetherz.bl ogspot.com/2009/06/how4/14/12 to-safeguard-our-personaland.html

Limitations

Additional Security Measures

In addition to the biometric systems already mentioned, a system of pin codes or security questions could be implicated to further provide a level of safety.

cyberarms.wordpress.com allfacebook.com

4/14/12

Providing efficient and protected access to accounts.

Over the Phone


4/14/12
bargainoffer s.com pulse2.com textually.org

Voice Recognition

Science

When a customer registers a bank account, they are recorded speaking an answer to a specific security question. When this customer calls to access their account information, the customer is asked to answer this question.

The answer of the customer is checked for correctness and against a voiceprint (spectrogram graph that records sounds Accuracytime). over Voice recognition can be affected by an illness or other medical condition, or emotion like extreme excitement or sadness.

Some systems can also be fooled by recordings of the users Limitations voice. This system of biometrics is limited because of its accuracy levels and abilities to be deceived. Some higher-technology devices can test for aliveness.

The system is affected by the quality of the device using to record the sound.

4/14/12

findbiometrics .com

Additional Security Measures

When registering an account, the customer could be asked for a list of acceptable phone numbers that can be used to access account information over the phone. These numbers have specific area codes and if the customer is calling without one of the listed phone numbers or the location is somewhere in rural Pakistan, the account will not be available for access.

valleyviewmarket.com paktelecom.net itunes.apple.com

4/14/12

Protecting information over the teller counter

In the Building
4/14/12
chestofbooks .com hubpages.co

Retina Scan

Science

Retinal scans uses a low intensity light source to scan the pattern of blood vessels in the retina. These patterns are stored in a database and accessed when the customer scans his/her retina. Error rate of 1 in 10,000,000 No one has the same retina, even identical twins.

Accuracy

Limitations

You have to take off any glasses or correctional lenses and hold your eyes still which may be difficult for some.

4/14/12

hlministries.blogs

Fingerprint Scan

Science

Fingerprint scanners detect the patterns and unique ridges in an individuals finger. The system being used would check the scanned print against a database of prints from all customers of the bank.
Fingerprint scanners are one of the most accurate biometric systems.

Accuracy

The scan hardly has a false match or rejects the correct fingerprint. Limitations

Some people have fingerprints that dont scan very well, or are unable to provide a fingerprint. Identical twins can have the same fingerprint patterns.

4/14/12

rinf.co

Success Story

Last year, I had a normal bank account with your average PIN codes and signatures, but when my house got broken in to and my files were stolen, my bank account was easily accessible as well. I now switched over to Big Money Bank$ and my files have never been more secure. No one can replicate my retina or get past the multiple measures to keep my account safe. Ari Johnson, Bank Customer

4/14/12

orange.c o.uk

Privacy Concerns

Some aspects of this security system are seen as very non-invasive and are already being used in other settings. These systems include signature, fingerprint, and voice verification. Other aspects of the system, such as retina scanners, can be seen as very invasive and may cause conflicts involving privacy. The solution to this is to have the customers understand that all these security measures are to keep their money and investments safe. The information in being stored in a private database.

4/14/12

reviewfuse.c om itthing.com

Beating the System

Statistically, this combination of biometric systems is impossible to beat. Individually, each system is difficult to beat. For example, the phone system could be beaten if your phone was stolen, robber knew the answer to your security question, and had your voice recorded. The ATM security system could only beaten if your hand was involuntarily used and signature forged exactly. In the building, only if your eye was involuntarily used, your PIN was accessed, and your identical twin used their fingerprint could the system be beat.

4/14/12

Bibliography

How does a retinal scan work?. Wise Geek [internet]. [2003-2011, accessed 9-12-11]; available from: http://www.wisegeek.com/how-does-a-retinal-scan-work.htm Biometric News Portal. (2011). Signature Biometrics. Retrieved September 12, 2011, from BiometricNewsPortal.com : http://www.biometricnewsportal.com/signature_biometrics.asp Biometric News Portal. (2011). Voice Biometrics. Retrieved September 12, 2011, from BiometricNewsPortal.com: http://www.biometricnewsportal.com/voice_biometrics.asp Find Biometrics. (2011). Voice/Speech Recognition. Retrieved September 12, 2011, from Find Biometrics: http://www.findbiometrics.com/voice-recognition/ Global Security. (2011, July 13). Voice Verification. Retrieved September 12, 2011, from GlobalSecurity.org: http://www.globalsecurity.org/security/systems/biometricsvoice.htm Mobbeel. (2011). Signature Recognition. Retrieved September 12, 2011, from Mobbeel: 4/14/12 http://www.mobbeel.com/technology/signature/

Вам также может понравиться