SlideShare une entreprise Scribd logo
1  sur  22
Adoption of Biometrics in the Global Marketplace



             Mizan Rahman
            M2SYS Technology
Why Biometrics?




                                                   Access Control
                                               Password Management
                                                Blood/Plasma Donor*            Security
           Payment,
          Membership
                                                  Digital Signature            HIPPA
                                                 (trade execution,
                                                  loan processing)




                               Convenience
                                                                      Compliance


© 2012 M2SYS Technology, All Rights Reserved
Drivers of Global Adoption




                     Government                Enterprise         Entrepreneurship
                     • e-Passport              • Single Sign on   • Payment
                     • Biometric ID            • Access Control   • Membership
                     • Voter                   • Regulations      • Workforce
                       Registration              (HIPPA)            Management
                     • AFIS




© 2012 M2SYS Technology, All Rights Reserved
How does the Global Model Work?


                        10 years ago only a few
                        countries deployed biometrics


                                Success of one country
                                inspired the other


                                       Innovations lowered the
                                       barrier to entry




© 2012 M2SYS Technology, All Rights Reserved
Global Propagation Mechanism




© 2012 M2SYS Technology, All Rights Reserved
e-Passport




                                               Malaysia was the first country in the
                                               world to issue biometric passports in
                                                               1998




© 2012 M2SYS Technology, All Rights Reserved
Aug 2012




                                                                    Image courtesy of Wikipedia



                        Biometric passports available to the general public
                        Announced future availability of biometric passports

© 2012 M2SYS Technology, All Rights Reserved
National ID Card




© 2012 M2SYS Technology, All Rights Reserved
Technical Impact of National ID
                                  Projects

                                                  Agile
                                                 process




                                   Scale of    Technical    Better
                                  economy                   device
                                               Maturity

                                                  New
                                                 modality



© 2012 M2SYS Technology, All Rights Reserved
Domestic Impact of National ID
                                 Projects


                                               National ID
                                  New
                            opportunities to
                            use biometrics in Foster innovation
             Introduces
                            various industry      for entire         Thrive
            biometrics to
                            verticals such as     biometric     entrepreneurship
          entire population
                                banking,           industry
                             healthcare and
                                  retail




© 2012 M2SYS Technology, All Rights Reserved
Turkish National ID Card



                                          Multi-modal biometric card


                                               Aligned with other projects (social
                                               security)


                                          Future vision




© 2012 M2SYS Technology, All Rights Reserved
Commercial & Civil Biometrics




             School/POS
                                                                     Bank ATM



                                                 Fitness Club



             Theme Park
                                                                     Payment
                                               Time and Attendance
© 2012 M2SYS Technology, All Rights Reserved
Biometric Equipped ATM




© 2012 M2SYS Technology, All Rights Reserved
ATM - Past, Present & Future


                                                  • Only vein
                               Started in Japan     technologies




                                                    Gained
                                                  popularity in    • Various
                                                  many other         modalities
                                                   countries



                                                                   Ubiquitous



© 2012 M2SYS Technology, All Rights Reserved
Drivers of the Commercial Biometrics
                            Business



                                           Government
                                                            ROI
                                            Adoption




                                                           Fraud
                                           Convenience
                                                         Prevention




© 2012 M2SYS Technology, All Rights Reserved
Challenges


                                                  System is
                                                 unreliable
                                                during winter
                    Only works
                                                                Device breaks
                    with 70% of
                                                                    down
                        the
                                                                 frequently
                    population



                                                 Next?

© 2012 M2SYS Technology, All Rights Reserved
Human Factor Engineering




© 2012 M2SYS Technology, All Rights Reserved
Human Factor Engineering

• Age of the                                • Intuitive design
  users                                     • User feedback
• Working class                             • Footprint
• Culture

                  Demography   Ergonomics




                   Weather        Cost


• Cold                                      • Biometric
• Dry                                         module can’t be
• Wet                                         more expensive
                                              then system
Keys to a Successful Deployment



                                  1            • Setting the right
                                                 expectation


                                  2            • Training the operators
                                                 and end users

                                               • Selling the right
                                  3              solution



© 2012 M2SYS Technology, All Rights Reserved
Going Global - Every Success Counts

                                                     Initiate



                                  Inspire                         Implement




                                               ROI              Use


© 2012 M2SYS Technology, All Rights Reserved
Thank You




© 2012 M2SYS Technology, All Rights Reserved
Contact Information

                  M2SYS Headquarters                               M2SYS ASIA Office
                  1050 Crown Pointe Pkwy.                                 House-279,
                  Suite 850                                                 Road-19,
                  Atlanta, GA                                         Mohakhali DOHS,
                  30338                                                 Dhaka - 01206
                  USA                                                     Bangladesh

                                               Email us at: sales@m2sys.com
                                               Call us: +1 (770) 393-0986


                                                                              http://www.facebook.com/m2sys

                                                                                 https://twitter.com/m2sys
                                                                              http://www.youtube.com/m2sys




© 2012 M2SYS Technology, All Rights Reserved

Contenu connexe

Tendances

Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Financial ux strategy
Financial ux strategyFinancial ux strategy
Financial ux strategyJerome Nadel
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Exploring the Connected Car
Exploring the Connected CarExploring the Connected Car
Exploring the Connected CarCognizant
 
SPA Futureproofing your payments at RBTE 2013 in London this week
SPA Futureproofing your payments at RBTE 2013 in London this weekSPA Futureproofing your payments at RBTE 2013 in London this week
SPA Futureproofing your payments at RBTE 2013 in London this weekSmart Payment Association
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 

Tendances (11)

Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Financial ux strategy
Financial ux strategyFinancial ux strategy
Financial ux strategy
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Pdf1
Pdf1Pdf1
Pdf1
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Exploring the Connected Car
Exploring the Connected CarExploring the Connected Car
Exploring the Connected Car
 
SPA Futureproofing your payments at RBTE 2013 in London this week
SPA Futureproofing your payments at RBTE 2013 in London this weekSPA Futureproofing your payments at RBTE 2013 in London this week
SPA Futureproofing your payments at RBTE 2013 in London this week
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Leveraging New Age Economy
Leveraging New Age Economy Leveraging New Age Economy
Leveraging New Age Economy
 

En vedette

biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 

En vedette (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
biometrics
biometricsbiometrics
biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 

Similaire à Biometric Technology and Human Factor Engineering

The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyInnoTech
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Justifying digital banking
Justifying digital bankingJustifying digital banking
Justifying digital bankingjoeychee
 
Maximize Enrollment, Engagement with a Multichannel Mobile Strategy
Maximize Enrollment, Engagement with a Multichannel Mobile StrategyMaximize Enrollment, Engagement with a Multichannel Mobile Strategy
Maximize Enrollment, Engagement with a Multichannel Mobile StrategyKony, Inc.
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Hello we're MOSAIC InfoTech
Hello we're MOSAIC InfoTechHello we're MOSAIC InfoTech
Hello we're MOSAIC InfoTechMosaicInfotech
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of SecurityInnoTech
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.Inforsystemi
 
Justifying digital banking
Justifying digital bankingJustifying digital banking
Justifying digital bankingjoeychee
 
IT Trends on Islamic Finance
IT Trends on Islamic Finance IT Trends on Islamic Finance
IT Trends on Islamic Finance Ahmed Buhazza
 
Cotsys ltd company presentation-2013 v1-6
Cotsys ltd company presentation-2013 v1-6Cotsys ltd company presentation-2013 v1-6
Cotsys ltd company presentation-2013 v1-6COTSYS LTD
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groepDerk Yntema
 

Similaire à Biometric Technology and Human Factor Engineering (20)

The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive Technology
 
Omni channel retail trends
Omni channel retail trendsOmni channel retail trends
Omni channel retail trends
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Justifying digital banking
Justifying digital bankingJustifying digital banking
Justifying digital banking
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
Maximize Enrollment, Engagement with a Multichannel Mobile Strategy
Maximize Enrollment, Engagement with a Multichannel Mobile StrategyMaximize Enrollment, Engagement with a Multichannel Mobile Strategy
Maximize Enrollment, Engagement with a Multichannel Mobile Strategy
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Hello we're MOSAIC InfoTech
Hello we're MOSAIC InfoTechHello we're MOSAIC InfoTech
Hello we're MOSAIC InfoTech
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of Security
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Sseiif
SseiifSseiif
Sseiif
 
Privacy in the Age of Big Data
Privacy in the Age of Big DataPrivacy in the Age of Big Data
Privacy in the Age of Big Data
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.
Infor i: Setting The Scene. Infor is the largest IBM i ISV in the World.
 
Justifying digital banking
Justifying digital bankingJustifying digital banking
Justifying digital banking
 
IT Trends on Islamic Finance
IT Trends on Islamic Finance IT Trends on Islamic Finance
IT Trends on Islamic Finance
 
Cotsys ltd company presentation-2013 v1-6
Cotsys ltd company presentation-2013 v1-6Cotsys ltd company presentation-2013 v1-6
Cotsys ltd company presentation-2013 v1-6
 
C&T 2010 opening remarks - Bill Rosenblatt
C&T 2010 opening remarks - Bill RosenblattC&T 2010 opening remarks - Bill Rosenblatt
C&T 2010 opening remarks - Bill Rosenblatt
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groep
 

Plus de M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Plus de M2SYS Technology (17)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Biometric Technology and Human Factor Engineering

  • 1. Adoption of Biometrics in the Global Marketplace Mizan Rahman M2SYS Technology
  • 2. Why Biometrics? Access Control Password Management Blood/Plasma Donor* Security Payment, Membership Digital Signature HIPPA (trade execution, loan processing) Convenience Compliance © 2012 M2SYS Technology, All Rights Reserved
  • 3. Drivers of Global Adoption Government Enterprise Entrepreneurship • e-Passport • Single Sign on • Payment • Biometric ID • Access Control • Membership • Voter • Regulations • Workforce Registration (HIPPA) Management • AFIS © 2012 M2SYS Technology, All Rights Reserved
  • 4. How does the Global Model Work? 10 years ago only a few countries deployed biometrics Success of one country inspired the other Innovations lowered the barrier to entry © 2012 M2SYS Technology, All Rights Reserved
  • 5. Global Propagation Mechanism © 2012 M2SYS Technology, All Rights Reserved
  • 6. e-Passport Malaysia was the first country in the world to issue biometric passports in 1998 © 2012 M2SYS Technology, All Rights Reserved
  • 7. Aug 2012 Image courtesy of Wikipedia Biometric passports available to the general public Announced future availability of biometric passports © 2012 M2SYS Technology, All Rights Reserved
  • 8. National ID Card © 2012 M2SYS Technology, All Rights Reserved
  • 9. Technical Impact of National ID Projects Agile process Scale of Technical Better economy device Maturity New modality © 2012 M2SYS Technology, All Rights Reserved
  • 10. Domestic Impact of National ID Projects National ID New opportunities to use biometrics in Foster innovation Introduces various industry for entire Thrive biometrics to verticals such as biometric entrepreneurship entire population banking, industry healthcare and retail © 2012 M2SYS Technology, All Rights Reserved
  • 11. Turkish National ID Card Multi-modal biometric card Aligned with other projects (social security) Future vision © 2012 M2SYS Technology, All Rights Reserved
  • 12. Commercial & Civil Biometrics School/POS Bank ATM Fitness Club Theme Park Payment Time and Attendance © 2012 M2SYS Technology, All Rights Reserved
  • 13. Biometric Equipped ATM © 2012 M2SYS Technology, All Rights Reserved
  • 14. ATM - Past, Present & Future • Only vein Started in Japan technologies Gained popularity in • Various many other modalities countries Ubiquitous © 2012 M2SYS Technology, All Rights Reserved
  • 15. Drivers of the Commercial Biometrics Business Government ROI Adoption Fraud Convenience Prevention © 2012 M2SYS Technology, All Rights Reserved
  • 16. Challenges System is unreliable during winter Only works Device breaks with 70% of down the frequently population Next? © 2012 M2SYS Technology, All Rights Reserved
  • 17. Human Factor Engineering © 2012 M2SYS Technology, All Rights Reserved
  • 18. Human Factor Engineering • Age of the • Intuitive design users • User feedback • Working class • Footprint • Culture Demography Ergonomics Weather Cost • Cold • Biometric • Dry module can’t be • Wet more expensive then system
  • 19. Keys to a Successful Deployment 1 • Setting the right expectation 2 • Training the operators and end users • Selling the right 3 solution © 2012 M2SYS Technology, All Rights Reserved
  • 20. Going Global - Every Success Counts Initiate Inspire Implement ROI Use © 2012 M2SYS Technology, All Rights Reserved
  • 21. Thank You © 2012 M2SYS Technology, All Rights Reserved
  • 22. Contact Information M2SYS Headquarters M2SYS ASIA Office 1050 Crown Pointe Pkwy. House-279, Suite 850 Road-19, Atlanta, GA Mohakhali DOHS, 30338 Dhaka - 01206 USA Bangladesh Email us at: sales@m2sys.com Call us: +1 (770) 393-0986 http://www.facebook.com/m2sys https://twitter.com/m2sys http://www.youtube.com/m2sys © 2012 M2SYS Technology, All Rights Reserved