8/4/2019 BMR Biometrics
1/17
4/14/12
Click to edit Master subtitle styleSecuring your money, saving you time.
BMR Biometrics
8/4/2019 BMR Biometrics
2/17
4/14/12
Our Mission
To recognize who your customers are in order to personalize theirbanking experience.
To protect your customers money in the most efficient, mostsecure way possible.
To stay ahead of technology and keep your business cutting
edge.
Client Goals
Securing access to accounts
Security inside the building
Secure ATM transactions Secure access over the phone
socketsite.com
8/4/2019 BMR Biometrics
3/17
4/14/12
Security Plan
ATM:Secure Automatic Transactions by a hand scanner and signaturerecognition software
Phone:Recognize voice and location over the phone
Counter:Retina scan to ensure optimum security & fingerprint match tochange account settings
neweffectit.commidlandsecurityguard.com
princeton.edu
8/4/2019 BMR Biometrics
4/17
4/14/12
At the ATM
Ensuring a safe and secure transaction.
reidsguides.com
capitaloneatm.comfitnessanddefens
8/4/2019 BMR Biometrics
5/17
4/14/12
Hand Scanning
Science
Works by creating and storing the templates of handin a biometric database.
These templates are accessed when a customer places his/herhand on the scanner.
The handprint is verified with the template stored in thesystem.
Accuracy
Hand scanners are completely accurate in extremetemperatures and are accurate even when hands are dirty.
Limitations
Has to take a complete scan. It wont work if the person has nohands.
http://atechnoblast.blogspot.com/2010/08/what-is-vein-
- - -
8/4/2019 BMR Biometrics
6/17
4/14/12
Signature Verification
Science A machine detects certain aspects of the users signature.
These details include speed, acceleration, deceleration,stroke sequencing, length, pen pressure and timinginformation.
The aspects of a customers signature are recordedgraphically and checked against the signatures alreadyassociated with the account.
Accuracy
Signature verification is a very accurate way of confirming theidentity of the user when performed correctly. Difficulties lie inthe user replicating his/her signature every time.
Limitations
Limited by the accuracy of the pad and stylus used to write thesignature.
Because an individuals signature can vary from instance to instance,signature verification can have a high false rejection rate..
http://webelongtogetherz.bl
ogspot.com/2009/06/how-to-safeguard-our-personal-n .h ml
8/4/2019 BMR Biometrics
7/17
4/14/12
Additional Security Measures
In addition to the biometric systems already mentioned, a systemof pin codes or security questions could be implicated to furtherprovide a level of safety.
cyberarms.wordpress.com
allfacebook.com
8/4/2019 BMR Biometrics
8/17
4/14/12
Over the Phone
Providing efficient and protected access to accounts.
bargainoffers.com
pulse2.comtextually.org
8/4/2019 BMR Biometrics
9/17
4/14/12
Voice Recognition
Science When a customer registers a bank account, they are
recorded speaking an answer to a specific security question.
When this customer calls to access their account information,the customer is asked to answer this question.
The answer of the customer is checked for correctness andagainst a voiceprint (spectrogram graph that records soundsover time).
Accuracy
Voice recognition can be affected by an illness or other medicalcondition, or emotion like extreme excitement or sadness.
Some systems can also be fooled by recordings of the usersvoice. Limitations
This system of biometrics is limited because of its accuracylevels and abilities to be deceived. Some higher-technologydevices can test for aliveness.
The system is affected by the quality of the device using torecord the sound.
findbiometrics.com
8/4/2019 BMR Biometrics
10/17
4/14/12
Additional Security Measures
When registering an account, the customer could be asked for a listof acceptable phone numbers that can be used to access accountinformation over the phone. These numbers have specific areacodes and if the customer is calling without one of the listed phonenumbers or the location is somewhere in rural Pakistan, theaccount will not be available for access.
valleyviewmarket.com
paktelecom.netitunes.apple.com
8/4/2019 BMR Biometrics
11/17
4/14/12
In the Building
Protecting information over the teller counter
chestofbooks
.comhubpages.co
8/4/2019 BMR Biometrics
12/17
4/14/12
Retina Scan
Science
Retinal scans uses a low intensity light source to scan thepattern of blood vessels in the retina.
These patterns are stored in a database and accessed when thecustomer scans his/her retina.
Accuracy
Error rate of 1 in 10,000,000
No one has the same retina, even identical twins.
Limitations
You have to take off any glasses or correctional lenses and holdyour eyes still which may be difficult for some.
hlministries.blogs
8/4/2019 BMR Biometrics
13/17
4/14/12
Fingerprint Scan
Science
Fingerprint scanners detect the patterns and unique ridges inan individuals finger.
The system being used would check the scanned printagainst a database of prints from all customers of the bank.
Accuracy Fingerprint scanners are one of the most accurate biometric
systems.
The scan hardly has a false match or rejects the correctfingerprint.
Limitations
Some people have fingerprints that dont scan very well, or areunable to provide a fingerprint.
Identical twins can have the same fingerprint patterns.
rinf.co
8/4/2019 BMR Biometrics
14/17
4/14/12
Last year, I had a normal bank account with your average PINcodes and signatures, but when my house got broken in to and myfiles were stolen, my bank account was easily accessible as well. Inow switched over to Big Money Bank$ and my files have neverbeen more secure. No one can replicate my retina or get past themultiple measures to keep my account safe.
Ari Johnson, Bank Customer
Success Story
orange.co.uk
8/4/2019 BMR Biometrics
15/17
4/14/12
Privacy Concerns
Some aspects of this security system are seen as very non-invasiveand are already being used in other settings. These systemsinclude signature, fingerprint, and voice verification. Other aspectsof the system, such as retina scanners, can be seen as veryinvasive and may cause conflicts involving privacy. The solution tothis is to have the customers understand that all these security
measures are to keep their money and investments safe. Theinformation in being stored in a private database.
reviewfuse.c
omitthing.com
8/4/2019 BMR Biometrics
16/17
4/14/12
Beating the System
Statistically, this combination of biometric systems is impossible tobeat.
Individually, each system is difficult to beat.
For example, the phone system could be beaten if your phone wasstolen, robber knew the answer to your security question, and had
your voice recorded. The ATM security system could only beaten if your hand was
involuntarily used and signature forged exactly.
In the building, only if your eye was involuntarily used, your PINwas accessed, and your identical twin used their fingerprint couldthe system be beat.
8/4/2019 BMR Biometrics
17/17
4/14/12
Bibliography
How does a retinal scan work?. Wise Geek [internet]. [2003-2011,accessed 9-12-11]; available from:http://www.wisegeek.com/how-does-a-retinal-scan-work.ht m
Biometric News Portal. (2011). Signature Biometrics. RetrievedSeptember 12, 2011, from BiometricNewsPortal.com :http://www.biometricnewsportal.com/signature_biometrics.asp
Biometric News Portal. (2011). Voice Biometrics. RetrievedSeptember 12, 2011, from BiometricNewsPortal.com:http://www.biometricnewsportal.com/voice_biometrics.asp
Find Biometrics. (2011). Voice/Speech Recognition. RetrievedSeptember 12, 2011, from Find Biometrics:
http://www.findbiometrics.com/voice-recognition/ Global Security. (2011, July 13). Voice Verification. Retrieved
September 12, 2011, from GlobalSecurity.org:http://www.globalsecurity.org/security/systems/biometrics-voice.htm
Mobbeel. (2011). Signature Recognition. Retrieved September 12,
2011, from Mobbeel:http://www mobbeel com/technology/signature/
http://www.wisegeek.com/how-does-a-retinal-scan-work.htmhttp://www.wisegeek.com/how-does-a-retinal-scan-work.htm