Age verification in real time keeping children safe online biometric solution

20
Age verification in real- time keeping Children Safe Online: Biometric Solution By AboulElla Hassanien, Faculty of Computers & Information Cairo University http://www .egyptscience.net/ http://scholar.cu.edu.eg/abo Email: [email protected]

Transcript of Age verification in real time keeping children safe online biometric solution

Page 1: Age verification in real time keeping children safe online biometric solution

Age verification in real-time keeping Children Safe

Online Biometric Solution

By

AboulElla HassanienFaculty of Computers amp Information

Cairo Universityhttpwwwegyptsciencenet httpscholarcueduegaboEmail aboitcairogmailcom

Agenda

Childrens Internet Safety Children today are hellip

Digital Natives Internet social networks

Biometrics An overview Age verification Social networking Integration Conclusion

Childrens Internet Safety Child internet safety is

becoming one of the main concerns of both regulators and end-users

As more and more venues for interaction move online children are becoming more and more exposed to online predators

Children today are hellipDigital Natives

Online Growing up in a world of technology Connected 21st century learners

Parents wanthellip1048708 Safety 1048708 Balance

What worries parentshellip Predatorsstrangers Privacy Cyberbullying Inappropriate content

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 2: Age verification in real time keeping children safe online biometric solution

Agenda

Childrens Internet Safety Children today are hellip

Digital Natives Internet social networks

Biometrics An overview Age verification Social networking Integration Conclusion

Childrens Internet Safety Child internet safety is

becoming one of the main concerns of both regulators and end-users

As more and more venues for interaction move online children are becoming more and more exposed to online predators

Children today are hellipDigital Natives

Online Growing up in a world of technology Connected 21st century learners

Parents wanthellip1048708 Safety 1048708 Balance

What worries parentshellip Predatorsstrangers Privacy Cyberbullying Inappropriate content

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 3: Age verification in real time keeping children safe online biometric solution

Childrens Internet Safety Child internet safety is

becoming one of the main concerns of both regulators and end-users

As more and more venues for interaction move online children are becoming more and more exposed to online predators

Children today are hellipDigital Natives

Online Growing up in a world of technology Connected 21st century learners

Parents wanthellip1048708 Safety 1048708 Balance

What worries parentshellip Predatorsstrangers Privacy Cyberbullying Inappropriate content

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 4: Age verification in real time keeping children safe online biometric solution

Children today are hellipDigital Natives

Online Growing up in a world of technology Connected 21st century learners

Parents wanthellip1048708 Safety 1048708 Balance

What worries parentshellip Predatorsstrangers Privacy Cyberbullying Inappropriate content

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 5: Age verification in real time keeping children safe online biometric solution

Parents wanthellip1048708 Safety 1048708 Balance

What worries parentshellip Predatorsstrangers Privacy Cyberbullying Inappropriate content

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 6: Age verification in real time keeping children safe online biometric solution

Parents wanthellip Creates safer online

environments for children Prevents contact by sexual

predators with children Prevents access to inappropriate

content and services Enables lsquopredator freersquo P2P

interactions Integrates easily with social

networks IM platforms online chats and other existing online services as well as parental controls applications and internet security suites

Instant messaging (IM) is a form of real-time communication between two or more people based on typed text

Solution

Biometric

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 7: Age verification in real time keeping children safe online biometric solution

Parents wanthellip

How do you know that the person on the other end of a chat is really the 13 year old girl they claim to be

This is the number one problem facing parents and children on the web today Children want to be free to use the web as a platform for socializing however that freedom means being more accessible to online predators

The Solution accurately verifies a users age group using biometric technology By using it to identify verified children within your network you can filter contacts and interactions and ensure that children can only interact with children or parent verified contacts

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 8: Age verification in real time keeping children safe online biometric solution

Distinguish between the real children and predators Internet social networks focus on building online communities with like-minded

people They allow people to communicate and share information on a wide scale and to

find others who share similar interests People share information by creating a user profile and then updating their profiles

with status alerts (eg Im on my way to the mall) pictures and other items of interest to them They make connections with people they already know and meet new people through their online friends and friends of friends It is safest to only link to someones profile if you know them in real life

Social networks are one of the most popular venues for online activity More and more children spend time on social networks which have become a haven for sexual predators

Itrsquos nearly impossible to distinguish between the real children and predators posing as children

Some networks have responded by only offering their services to adults This in turn has found more and more children presenting themselves as adults on these networks

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 9: Age verification in real time keeping children safe online biometric solution

Solution Age verification

Age verification has been a hot topic as of late as a means for keeping children safe on the Internet

The age verification process can also serve as a further measure of security for the ldquoparentrdquo configuration process ensuring the child cannot circumvent the parentrsquos policies

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 10: Age verification in real time keeping children safe online biometric solution

Biometric Technology

Biometric Technology biometric authentication refers to technologies that measure and analyze human physical and behavioral characteristics for recognition and authentication purposes (security)

The main benefit of the biometric technology is that is more safe and comfortable that the traditional systems

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 11: Age verification in real time keeping children safe online biometric solution

Commonly Used Biometrics

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 12: Age verification in real time keeping children safe online biometric solution

Types of biometrics

Physiological Biometrics Based on direct

measurements and data derived from measurements of a part of the human body

Fingerprints Face Recognition Hand geometry amp

Hand Bone Iris recognition Retina Recognition

Behavioral biometrics Based on measurements

and data derived from human actions

Signature Voice

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 13: Age verification in real time keeping children safe online biometric solution

Identification Vs Verification

Recognition or identification implies checking whether a person is in the systemrsquos database or not (one-to-many search)

Verification or authentication implies checking the identity claim presented by a user (one-to-one search)

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 14: Age verification in real time keeping children safe online biometric solution

Biometric Architecture and Operation

Validation

Compare these features against template

Extract Feature

Processed this signal

Raw Biometric Signal

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 15: Age verification in real time keeping children safe online biometric solution

Processing Examples

Template Formation

Data Capture amp Conditioning

Feature Extraction

Retinal Scan Processing

Data Capture amp Conditioning

Feature Extraction

Template Formation

Fingerprint Processing

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 16: Age verification in real time keeping children safe online biometric solution

Future PCs Biometric-based

Future PCs may bar children from Internet sites by using an ultrasound device to gauge their age from a hand bone

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 17: Age verification in real time keeping children safe online biometric solution

Future PCs Biometric-based

ID Reader Age Verification

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 18: Age verification in real time keeping children safe online biometric solution

ID and Hand Scanner

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 19: Age verification in real time keeping children safe online biometric solution

Age verification and social network an Integration

Inspection amp Analysis of Child Direct (P2P) Communication

Enforce parent policy on open social network child communication

Social Network

P2P IM Chat

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions
Page 20: Age verification in real time keeping children safe online biometric solution

Conclusions

To access a site that required authentication a person would place their fist against the device Using ultrasound the i-Mature measures the bone density of the longest bone in a middle finger to determine a persons age

The technology can be housed in a standalone device or integrated into the keyboard of a PC or laptop

  • Age verification in real-time keeping Children Safe Online Bio
  • Agenda
  • Childrens Internet Safety
  • Children today are hellip Digital Natives
  • Parents wanthellip 1048708 Safety 1048708 Balance
  • Parents wanthellip
  • Parents wanthellip (2)
  • Distinguish between the real children and predators
  • Solution Age verification
  • Biometric Technology
  • Commonly Used Biometrics
  • Types of biometrics
  • Identification Vs Verification
  • Biometric Architecture and Operation
  • Processing Examples
  • Future PCs Biometric-based
  • Future PCs Biometric-based (2)
  • ID and Hand Scanner
  • Age verification and social network an Integration
  • Conclusions