SlideShare ist ein Scribd-Unternehmen logo
1 von 13
ample biometrics
identification made simple
 Time attendance fraud is $140,000 on
average, over $1 million 20% of the time
 About 82% of the people forget their
passwords on a website
 Over 175 million passwords have been
pwned https://haveibeenpwned.com
 $5.5 billion worth credit card fraud worldwide
“Our problem space.”
A vein scanning identification device.
“How does Ample solve the
problem?”
“Veinprints are better than fingerprints
 You can’t steal vein prints
 You leave fingerprints everywhere
 Fingerprints can become scarred, burned
 Veins can work under bandages, latex gloves
“Our many use cases”
Access control
Payments Online security
Time
attendance
Hotels
Passwords
 Secure technology
 Inexpensive
 Easy to use
 Myriad
applications
“Why Ample?”
“Seamless integration.”
“We believe that…”
Ample can end the need
for wallets, passwords,
keys
“Our business model”
 In house vein scanner manufacturing
 Up to 99% accurate
 Currently targeting small businesses
and hotels
“Who’s interested?”
“Our team”
We’re electrical engineers and programmers
Aditya Donny
a
Dylan Eric Janani
“Raising $XXX in funding!!”
ample biometrics
info@amplebiometrics.com
www.amplebiometrics.com

Weitere ähnliche Inhalte

Andere mochten auch

Dwolla Startup Pitch Deck
Dwolla Startup Pitch DeckDwolla Startup Pitch Deck
Dwolla Startup Pitch DeckJoseph Hsieh
 
The investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsThe investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsMikael Cho
 
Foursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckFoursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckRami Al-Karmi
 
Linkedin Series B Pitch Deck
Linkedin Series B Pitch DeckLinkedin Series B Pitch Deck
Linkedin Series B Pitch DeckJoseph Hsieh
 
The slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsThe slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsBuffer
 
Davai Pitchdeck
Davai Pitchdeck Davai Pitchdeck
Davai Pitchdeck davaiapp
 
Brandvee Seed Investment Deck
Brandvee Seed Investment DeckBrandvee Seed Investment Deck
Brandvee Seed Investment DeckDavid Sabo
 
PitchDeck_GridironMatch Final
PitchDeck_GridironMatch FinalPitchDeck_GridironMatch Final
PitchDeck_GridironMatch FinalManuel Reyes
 
#PitchDeck - 4# Most Affordable CRM in the World - by Capptera
#PitchDeck - 4# Most Affordable CRM in the World - by Capptera#PitchDeck - 4# Most Affordable CRM in the World - by Capptera
#PitchDeck - 4# Most Affordable CRM in the World - by CappteraFilip Duszczak
 
The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] Vin Lim
 
Standard Treasury Series A Pitch Deck
Standard Treasury Series A Pitch DeckStandard Treasury Series A Pitch Deck
Standard Treasury Series A Pitch DeckZachary Townsend
 
TouristEye - Personalizing The Travel Experience - 500 Startups
TouristEye - Personalizing The Travel Experience - 500 StartupsTouristEye - Personalizing The Travel Experience - 500 Startups
TouristEye - Personalizing The Travel Experience - 500 Startups500 Startups
 
Square pitch deck
Square pitch deckSquare pitch deck
Square pitch deckpitchenvy
 

Andere mochten auch (17)

Dwolla Startup Pitch Deck
Dwolla Startup Pitch DeckDwolla Startup Pitch Deck
Dwolla Startup Pitch Deck
 
The investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollarsThe investor presentation we used to raise 2 million dollars
The investor presentation we used to raise 2 million dollars
 
Foursquare's 1st Pitch Deck
Foursquare's 1st Pitch DeckFoursquare's 1st Pitch Deck
Foursquare's 1st Pitch Deck
 
Linkedin Series B Pitch Deck
Linkedin Series B Pitch DeckLinkedin Series B Pitch Deck
Linkedin Series B Pitch Deck
 
The slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollarsThe slide deck we used to raise half a million dollars
The slide deck we used to raise half a million dollars
 
AirBnB Pitch Deck
AirBnB Pitch Deck AirBnB Pitch Deck
AirBnB Pitch Deck
 
Davai Pitchdeck
Davai Pitchdeck Davai Pitchdeck
Davai Pitchdeck
 
Early Logic sales pitchdeck
Early Logic sales pitchdeckEarly Logic sales pitchdeck
Early Logic sales pitchdeck
 
Brandvee Seed Investment Deck
Brandvee Seed Investment DeckBrandvee Seed Investment Deck
Brandvee Seed Investment Deck
 
PitchDeck_GridironMatch Final
PitchDeck_GridironMatch FinalPitchDeck_GridironMatch Final
PitchDeck_GridironMatch Final
 
#PitchDeck - 4# Most Affordable CRM in the World - by Capptera
#PitchDeck - 4# Most Affordable CRM in the World - by Capptera#PitchDeck - 4# Most Affordable CRM in the World - by Capptera
#PitchDeck - 4# Most Affordable CRM in the World - by Capptera
 
Remark
RemarkRemark
Remark
 
The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated]
 
Standard Treasury Series A Pitch Deck
Standard Treasury Series A Pitch DeckStandard Treasury Series A Pitch Deck
Standard Treasury Series A Pitch Deck
 
TouristEye - Personalizing The Travel Experience - 500 Startups
TouristEye - Personalizing The Travel Experience - 500 StartupsTouristEye - Personalizing The Travel Experience - 500 Startups
TouristEye - Personalizing The Travel Experience - 500 Startups
 
Square pitch deck
Square pitch deckSquare pitch deck
Square pitch deck
 
task.ly pitch deck
task.ly pitch decktask.ly pitch deck
task.ly pitch deck
 

Ähnlich wie Biometric Identification Solution Ends Need for Passwords & Keys

Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVijayan Ganapathy
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptxvb334531
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemytlineshill
 
Clearpreso client: Trustev
Clearpreso client: TrustevClearpreso client: Trustev
Clearpreso client: TrustevClearpreso
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityJarrod Overson
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.RobbiePaterson2
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRI
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRIArtificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRI
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRIAssist
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseGlobal Business Events
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docxMARRY7
 
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...Aaron Kelly Lawyer
 

Ähnlich wie Biometric Identification Solution Ends Need for Passwords & Keys (20)

Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
 
Presentation -A
Presentation  -APresentation  -A
Presentation -A
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptx
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemy
 
Clearpreso client: Trustev
Clearpreso client: TrustevClearpreso client: Trustev
Clearpreso client: Trustev
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Rishab 10c
Rishab 10cRishab 10c
Rishab 10c
 
advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRI
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRIArtificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRI
Artificial Intelligence at Work - Assist Workshop 2016 - Nick Triantos - SRI
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Gunning for granny
Gunning for grannyGunning for granny
Gunning for granny
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Internet of Things (2015)
Internet of Things (2015)Internet of Things (2015)
Internet of Things (2015)
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docx
 
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...How Can You Preserve Your Virtual Security in 2022  Arizona Attorney Aaron Ke...
How Can You Preserve Your Virtual Security in 2022 Arizona Attorney Aaron Ke...
 

Kürzlich hochgeladen

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Kürzlich hochgeladen (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

Biometric Identification Solution Ends Need for Passwords & Keys