SlideShare ist ein Scribd-Unternehmen logo
1 von 33
MEASURING Life FOR BIOSafety AND BIOSECURITY
Introduction to Telebiometrics: Markets and Applications
Measure-Understand-Control-Improve
“Measurement is the first step that leads to control and
eventually to improvement. If you can’t measure
something, you can’t understand it. If you can’t understand
it, you can’t control it. If you can’t control it, you can’t
improve it.”
― H. James Harrington
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Greek Origins
Telebiometrics: Quantifying Signs of Life
Roots of TeleBioMetrics
Tele – from Greek “Tele” – far, distant, remote
Modern translation – “reaching over a distance,” “carried out between two
remote points,” “performed or operating through electronic transmissions
Bio – from Greek “Bios” – life,
Modern translation – “life”, “living organism”, “biology”
Metrics - from Greek “Metron” – to measure
Modern translation – “the science of measuring”
Tele-Bio-Metrics - the science of measuring life between two remote points,
performed or operating through electronic transmission.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Goals
Expectations of a Telebiometric Enabled System
• Increase the level, resolution, and interoperability of bio-
quantification.
• Apply a standardized international measurement system.
• Deploy a standardized encryption method from the node
thru the gateway and into the cloud.
• Ensure privacy and accessibility in the cloud.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Biosafety Quad-Threat Matrix:
Telebiometrics: Bio-Safety
4 – Primary Types of Threats to Life
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Physical Attack
Accidents/Natural Disasters
Lack of Life Sustaining Resources
Disease
Telebiometric Systems comprise of the 3
fundamental components:
1.Hardware – Sensor transceiver, designed
to measure biological quantities and or
patterns over a network which are supported
by a gateway and cloud infrastructure.
2.Software – Protocol authored in ASN.1
describing, quantifying, comparing, and
communicating biological values to the
application.
3.Wetware – Biological target/entity within
proximity of the sensor which matches
thresholds defined in the ASN.1 protocol.
3 - Components of a Telebiometric System:
Hardware, Software, Wetware
Telebiometrics
Wetware
Hardware
Software
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Identify Unique
Specimen
Determine
Biological Species
Biological
Properties
Level 1: Application detects biological properties.
Level 2: Application determines which species.
Organized by Complexity
Levels of Telebiometric Quantification
Level 3: Application determines uniqueness among
species.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
How do I determine what is human?
3-Laws of Robotics
1. A robot may not injure a human being or,
through inaction, allow a human being to
come to harm.
2. A robot must obey the orders given it by
human beings except where such orders
would conflict with the First Law.
3. A robot must protect its own existence as
long as such protection does not conflict
with the First or Second Laws.
― Isaac Asimov
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Bio-Interaction: Scientific Fields of Study
Telebiometric – Interaction Model
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Biometrics
Biology to Machine Protocol (B2M):
Solution: A method for recognizing life.
What is Biology to Machine (B2M)?
•The goal of B2M is to include a standardized method of
packeting biological properties and entities using an
interaction taxonomy coupled to the metric system that
interoperates with existing M2M protocols.
•The role of B2M is to establish the conditions that allow a
device to bi-directionally exchange information with a
business application via a communication network, so that the
device and/or application can act as the basis for information
exchange.
•First to coin the term Biology to Machine (B2M) protocol!
Introduction to Telebiometrics: Markets and
Applications, John Caras, SG17/Q9 Rapporteur
Biology to Machine Protocol (B2M):
Middleware Architecture
MCU
Memory
(Middleware Protocol)
RX/TX
Middleware
HW Module
MCU
Memory
(Middleware Protocol)
RX/TX
Gateway Device
802.11
MCU
Memory
(Middleware Protocol)
RX/TX
Middleware
HW Module
MCU
Memory
(Middleware Protocol)
RX/TX
Middleware
HW Module
Cloud
Database Database Database Database
Sensor
Sensor
Sensor
Our ValueStrategic
Suppliers
X.Discovery
Ø A
Rata Data
Ø A
X.th-Structured Data
Ø A
Aggregated X.th-Structured Data Specific to Specimen
Ø A
X.Discovery Biological Application Data
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Benefits
Benefits of B2M Protocol
Manufacture Perspective
• Common data model among sensors developed by various
manufactures.
• Descriptive hierarchy of biology and associated quantities.
• Efficient method for communicating describing characterizing
biological quantities using the metric system.
• Establishing a robust biological communication platform for rapid
development and deployment independent of hardware and
software systems.
• Enabling customers to go to market faster.
• Increases success rate with national regulations e.g. FDA (U.S.)
• Minimizes interaction between human to animal disease
transmission.
• Enabling existing IoT devices to communicate with a unified
biological protocol.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Telebiometric Markets & Applications
Introduction to Telebiometrics: Markets and
Applications, John Caras, SG17/Q9 Rapporteur
Target Applications
Port Entry Gaming Mobile Identity
Environmental Impact TelemedicineAutomotive Safety
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Contactless Commerce
• Samsung Pay
• Apple Pay
• Alipay
•Contactless Commerce supports:
bank transfers, retail-stores, e-tailer,
toll roads, parking meters, fast food
restaurants,
Banking Application: Contactless Payment
Contactless Commerce
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Digital Signage:
• Determines biological qualities such as:
gender, race, and age.
• Targets advertisements tailored to
demographics.
• Ability to conduct contactless
transactions
Advertising: Tailored to Audience
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Native Biometrics
• 1st
time biometrics is natively supported in
an Operating System (Windows 10) and
Intel Chipsets.
• The FIDO Alliance has grown from six
founding members in 2013 to some 200
this year.
• Its goals are to encourage technology firms
to eradicate passwords and enhance
interoperability between authentication
systems.
Death to Passwords
Fast IDentity Online (FIDO) Alliance
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
e-Health
Baby monitor measures:
• Heart Rate (beats per minute)
• Body Temperature (C°/F°)
• Oxygen Saturation (%)
The monitor consists of a base station and a wristband
with 3-sensors tuned to wetware thresholds for heart
rate, temperature, and oxygen saturation
quantification.
The user sets alert ranges for each of the
measurements. The wristband quantifies the biological
target and transmits an encrypted ASN.1 packet back
to the base station. When the baby “Life Signs” fall out
of range and alert is enabled.
Alerts parents to the possibility of Sudden
Infant Death Syndrome (SIDS)!
Healthcare Application: Baby Monitor
Reducing Sudden Infant Death Syndrome (SIDS)
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Telecomm
Smart Watch measures:
• Heart Rate (beats per minute)
• Body Temperature (C°/F°)
• Oxygen Saturation (%)
• Location (GPS)
• Lifestyle Informatics
• Sleep monitor
The Smart Watch is full featured offering more
measurements which are transmitted over the mobile
network.
Healthcare providers can monitor and store patient’s
vital signs and activity in the cloud provided they have
matched authentication credentials.
Enables a faster response time in critical situations.
Lifestyle Application: Wearables
Mobile Monitoring
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Medical Equipment Tracking
• Medical equipment methods and
sensor threshold values are stored
within the record data.
• Gives healthcare provider a digital
record of the medical equipment
sensitivity and settings. Ensuring in
a lawsuit that the patient was
analyzed with proper equipment.
Healthcare Application: Teleradiology
Medical Equipment
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Ambient Assisted Living
In elderly care situations, a single senior
citizen lives alone. Telebiometric motion
sensors designed specifically for radiation
emissions from a human body are placed
through out the house.
When a patient ceases to move the an
alarm or phone can ring to check on
patient’s status.
Adjustable sensitivity allows for detection in
sleep.
Healthcare Application: Occupancy
Home Health Activity Monitor for Assisted Living
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
It’s all about the data……
Telehealth = Telebiometrics + Telemedicine
• Telehealth - is the use of electronic information and telecommunications
technologies to support long-distance clinical health care, patient and
professional health-related education, public health and health
administration.
• Telebiometrics – remote monitoring and reporting of biometric data.
• Telemedicine - the remote diagnosis and treatment of patients by means
of telecommunications technology.
• Professor Enrico M. Staderini MD, PhD of Western Switzerland University
of Applied Sciences discussed a quantified decision process for medical
therapy from “Handbook of analytic philosophy of medicine” by Kazem
Sadegh-Zadeh, Springer 2012.
• Diagnosis in Medical treatment especially in Telemedicine is very
dependent upon the quality of biological measurements.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Remote Temperature Measurement
Portable Thermal Imager measures:
• Body Temperature (C°/F°) as calibrated to
correlate with Radiation Emission wavelength
In this case the unit is far (Tele) from the patient
protecting the caregiver and can detect early
symptoms of illness.
Limits population exposure to a Pandemic Outbreak.
Bio-surveillance Application: Port Entry
Pandemic Detection
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Benefits of Telebiometrics:
 Contactless Biological Measurement. (Weight - kg, Body Temperature - C°, Heart Rate (bmp), Behavior
 Reduces the risk to operators - No Cross Contamination.
 Data is stored and viewed remotely.
 Equipment is reusable no waste is produced reducing the risk of transmitting infection via garbage
disposal.
 Multiple/Sensors Digital Data outputs for cloud storage e.g. video, photo, temperature, depth, and more.
Constant calibration built into system.
 Scan time less than Forehead IR Spot Meter and cheaper than 3 months of 10KU usage.
 Accurate body temperature measurements at eye/tear duct are within (+/- 1°C)
 Processing is done on camera with alarm triggers (IR).
 Can be combine with Passport Credentials/Global Entry system on a customer request basis.
Bio-surveillance Application: Port Entry
Pandemic Detection
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
IoT: Environmental Monitoring
• Biological Surface Area determination
• Water Surface Area Measurements
• Ect.
Chronic regional monitoring determines quality of biological entities and life sustaining resources.
DEFORESTATION MONITORING
Climate Change
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
IoT: Embedded Agriculture
• Sunlight
• Surface Temperature
• Humidity
• Water Cycles
• Pesticide
• Chemical Detection
• Fertilization
• Local Profile of plant species, seed date, crop
batch,
• Disease detection
• Insect Infestation
The monitor consists of a MEM based sensors,
embedded memory, energy harvesting, and short
range transceiver.
The Farmer sets alert ranges for each plant species
based upon required environmental interaction to
maintain and optimize plant growth and harvesting.
SMART AGRICULTURE:
Creating Optimal Conditions for Life
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Remote Livestock Monitoring
Live Stock monitoring measures:
• Heart Rate (beats per minute)
• Body Temperature (C°/F°)
• Oxygen Saturation (%)
• Unique Identification
• Disease Identification
• Body Mass
• Local Copy of Immunization records
The remote monitoring limits human to animal
disease transfer and reduces farm staff
expenses.
SMART FARM:
Hands Off Husbandry
Introduction to Telebiometrics: Markets and
Applications, John Caras, SG17/Q9 Rapporteur
Collision Priority
Back up cameras are becoming
mandatory in the US under new
government regulations in 2015 for
vehicles with a display.
Amending the law to include infrared
detection tailored to human radiation
emission would indicate to the driver
that a life form is in the path of vehicle
differentiating the obstacle from a
bush.
Automotive Application: Back up Camera
Infrared Detection
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Collision Avoidance
Telebiometric sensors tuned the
proper wavelength provides early
detection in forward looking driving
conditions.
Protecting:
• Cyclists
• Joggers
• Children
• Animals
• Passengers
• The Car
Automotive Application: Collision Avoidance
Forward looking Infrared & Pattern Detection
Telebiometrics
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Passenger Ambient Identification
• Airbag deployment positioning
• Customized multimedia settings, side
mirrors, and seat adjustment
• Seat belts enabled with heart
monitoring/bio-signals (monitoring
irritation or sleepiness)
• Image capture for driver verification in
accidents.
• Driver activity log for commercial truckers.
Automotive Application: Ambient Identification
Customizable Settings
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Urban Infographics
High-Resolution Population Determination for 1st
Responders.
Telebiometrics
Introduction to Telebiometrics: Markets and
Applications, John Caras, SG17/Q9 Rapporteur
Current Draft Recommendation Activity
Summary: Q9 Activity
X.tam – draft recommendation specifies the implementation model and
threats in the operating telebiometric systems in mobile devices and
provides a general guideline for implementing Samsung Pay and Apple
Pay.
X.bhsm – draft recommendation supports Telebiometric authentication
framework using biometric hardware security module.
X.th2-6 – draft recommendation establishes a interaction model and
forms a basis for Biology to Machine Protocol (B2M).
X.pbact – draft recommendation establishes a framework for how
telebiometric data is accessed in the cloud.
Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur
Join the Pack
Contact Us
John Caras
John.Caras@Telebiometrics.com
Facebook (50K+ Followers)
(408) 387-4700 Introduction to Telebiometrics: Markets and Applications,
John Caras, SG17/Q9 Rapporteur

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Securityijtsrd
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare IJECEIAES
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET Journal
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
An introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesAn introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesPascal Bodin
 
ITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 

Was ist angesagt? (20)

IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Security
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Iot
IotIot
Iot
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
An introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesAn introduction to M2M / IoT technologies
An introduction to M2M / IoT technologies
 
IEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTSIEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTS
 
ITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU-T Study Group 5 Introduction
ITU-T Study Group 5 Introduction
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 

Andere mochten auch

J340 PR Tactics_Press Release Final
J340 PR Tactics_Press Release FinalJ340 PR Tactics_Press Release Final
J340 PR Tactics_Press Release FinalScott Goodwin
 
ICANN Update
ICANN UpdateICANN Update
ICANN UpdateAPNIC
 
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3Μαρία Μανουρά
 
Tendencias pedagógicas
Tendencias pedagógicasTendencias pedagógicas
Tendencias pedagógicashiunday123
 
Medieval water structures and geology – indian context
Medieval water structures and geology – indian contextMedieval water structures and geology – indian context
Medieval water structures and geology – indian contextSHRINIVAS VADAGBALKAR
 
Cuestionario de discapacidad (1) revisado
Cuestionario de discapacidad (1)  revisadoCuestionario de discapacidad (1)  revisado
Cuestionario de discapacidad (1) revisadoElenyConde
 
Tipos de aprendizaje
Tipos de aprendizajeTipos de aprendizaje
Tipos de aprendizajeDevil_Mycry
 

Andere mochten auch (14)

J340 PR Tactics_Press Release Final
J340 PR Tactics_Press Release FinalJ340 PR Tactics_Press Release Final
J340 PR Tactics_Press Release Final
 
ICANN Update
ICANN UpdateICANN Update
ICANN Update
 
Guayaquil Port
Guayaquil PortGuayaquil Port
Guayaquil Port
 
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3
ΕΕΤ - 3D κτίρια στο Google Earth - Άσκηση 3
 
Mapa concepatual ng
Mapa concepatual ngMapa concepatual ng
Mapa concepatual ng
 
M a p a m e n t a l
M a p a     m e n t a lM a p a     m e n t a l
M a p a m e n t a l
 
Tendencias pedagógicas
Tendencias pedagógicasTendencias pedagógicas
Tendencias pedagógicas
 
Tipos de aprendizaje
Tipos de aprendizajeTipos de aprendizaje
Tipos de aprendizaje
 
Metacognicion 4
Metacognicion 4Metacognicion 4
Metacognicion 4
 
Rene descartes
Rene descartesRene descartes
Rene descartes
 
Medieval water structures and geology – indian context
Medieval water structures and geology – indian contextMedieval water structures and geology – indian context
Medieval water structures and geology – indian context
 
Observación de Células
Observación de CélulasObservación de Células
Observación de Células
 
Cuestionario de discapacidad (1) revisado
Cuestionario de discapacidad (1)  revisadoCuestionario de discapacidad (1)  revisado
Cuestionario de discapacidad (1) revisado
 
Tipos de aprendizaje
Tipos de aprendizajeTipos de aprendizaje
Tipos de aprendizaje
 

Ähnlich wie ITU Standardization of Telebiometric applications

Real Time Physiological Status Monitorinig through Telemetry System for on Sp...
Real Time Physiological Status Monitorinig through Telemetry System for on Sp...Real Time Physiological Status Monitorinig through Telemetry System for on Sp...
Real Time Physiological Status Monitorinig through Telemetry System for on Sp...ijtsrd
 
Wearable sensor network for lower limb angle estimation in robotics applications
Wearable sensor network for lower limb angle estimation in robotics applicationsWearable sensor network for lower limb angle estimation in robotics applications
Wearable sensor network for lower limb angle estimation in robotics applicationsTELKOMNIKA JOURNAL
 
peer reviewed journals
 peer reviewed journals  peer reviewed journals
peer reviewed journals akhila1001
 
Final ppt
Final pptFinal ppt
Final pptW3Edify
 
Implementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemImplementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemkchakrireddy
 
Security in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applicationsSecurity in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applicationsIOSR Journals
 
How Wireless Healthcare Systems benefit from 5G
How Wireless Healthcare Systems benefit from 5GHow Wireless Healthcare Systems benefit from 5G
How Wireless Healthcare Systems benefit from 5Gmsh7610
 
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...Ofer Atzmon
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET Journal
 
Wireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareWireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareIOSR Journals
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
Wearable technology role in respiratory health and disease
Wearable technology role in respiratory health and diseaseWearable technology role in respiratory health and disease
Wearable technology role in respiratory health and diseasessusera8803c
 

Ähnlich wie ITU Standardization of Telebiometric applications (20)

Real Time Physiological Status Monitorinig through Telemetry System for on Sp...
Real Time Physiological Status Monitorinig through Telemetry System for on Sp...Real Time Physiological Status Monitorinig through Telemetry System for on Sp...
Real Time Physiological Status Monitorinig through Telemetry System for on Sp...
 
Smart sensor technology in healthcare & protection
Smart sensor technology in healthcare & protectionSmart sensor technology in healthcare & protection
Smart sensor technology in healthcare & protection
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 
L16 Internet of Things
L16 Internet of ThingsL16 Internet of Things
L16 Internet of Things
 
E0512535
E0512535E0512535
E0512535
 
Wearable sensor network for lower limb angle estimation in robotics applications
Wearable sensor network for lower limb angle estimation in robotics applicationsWearable sensor network for lower limb angle estimation in robotics applications
Wearable sensor network for lower limb angle estimation in robotics applications
 
Research Journal
Research JournalResearch Journal
Research Journal
 
Paper Publication
Paper PublicationPaper Publication
Paper Publication
 
peer reviewed journals
 peer reviewed journals  peer reviewed journals
peer reviewed journals
 
Final ppt
Final pptFinal ppt
Final ppt
 
Implementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemImplementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring system
 
Security in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applicationsSecurity in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applications
 
How Wireless Healthcare Systems benefit from 5G
How Wireless Healthcare Systems benefit from 5GHow Wireless Healthcare Systems benefit from 5G
How Wireless Healthcare Systems benefit from 5G
 
Ecc08 malta
Ecc08 maltaEcc08 malta
Ecc08 malta
 
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...
The Evolution of Wearable M-Health Applications - Mobile Health Expo New York...
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
 
Wireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareWireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in Healthcare
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
Wearable technology role in respiratory health and disease
Wearable technology role in respiratory health and diseaseWearable technology role in respiratory health and disease
Wearable technology role in respiratory health and disease
 

Mehr von ITU

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? ITU
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersITU
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5GITU
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated DrivingITU
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyondITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesITU
 

Mehr von ITU (20)

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

ITU Standardization of Telebiometric applications

  • 1. MEASURING Life FOR BIOSafety AND BIOSECURITY Introduction to Telebiometrics: Markets and Applications
  • 2. Measure-Understand-Control-Improve “Measurement is the first step that leads to control and eventually to improvement. If you can’t measure something, you can’t understand it. If you can’t understand it, you can’t control it. If you can’t control it, you can’t improve it.” ― H. James Harrington Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 3. Greek Origins Telebiometrics: Quantifying Signs of Life Roots of TeleBioMetrics Tele – from Greek “Tele” – far, distant, remote Modern translation – “reaching over a distance,” “carried out between two remote points,” “performed or operating through electronic transmissions Bio – from Greek “Bios” – life, Modern translation – “life”, “living organism”, “biology” Metrics - from Greek “Metron” – to measure Modern translation – “the science of measuring” Tele-Bio-Metrics - the science of measuring life between two remote points, performed or operating through electronic transmission. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 4. Goals Expectations of a Telebiometric Enabled System • Increase the level, resolution, and interoperability of bio- quantification. • Apply a standardized international measurement system. • Deploy a standardized encryption method from the node thru the gateway and into the cloud. • Ensure privacy and accessibility in the cloud. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 5. Biosafety Quad-Threat Matrix: Telebiometrics: Bio-Safety 4 – Primary Types of Threats to Life Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur Physical Attack Accidents/Natural Disasters Lack of Life Sustaining Resources Disease
  • 6. Telebiometric Systems comprise of the 3 fundamental components: 1.Hardware – Sensor transceiver, designed to measure biological quantities and or patterns over a network which are supported by a gateway and cloud infrastructure. 2.Software – Protocol authored in ASN.1 describing, quantifying, comparing, and communicating biological values to the application. 3.Wetware – Biological target/entity within proximity of the sensor which matches thresholds defined in the ASN.1 protocol. 3 - Components of a Telebiometric System: Hardware, Software, Wetware Telebiometrics Wetware Hardware Software Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 7. Identify Unique Specimen Determine Biological Species Biological Properties Level 1: Application detects biological properties. Level 2: Application determines which species. Organized by Complexity Levels of Telebiometric Quantification Level 3: Application determines uniqueness among species. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 8. How do I determine what is human? 3-Laws of Robotics 1. A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2. A robot must obey the orders given it by human beings except where such orders would conflict with the First Law. 3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Laws. ― Isaac Asimov Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 9. Bio-Interaction: Scientific Fields of Study Telebiometric – Interaction Model Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 10. Biometrics Biology to Machine Protocol (B2M): Solution: A method for recognizing life. What is Biology to Machine (B2M)? •The goal of B2M is to include a standardized method of packeting biological properties and entities using an interaction taxonomy coupled to the metric system that interoperates with existing M2M protocols. •The role of B2M is to establish the conditions that allow a device to bi-directionally exchange information with a business application via a communication network, so that the device and/or application can act as the basis for information exchange. •First to coin the term Biology to Machine (B2M) protocol! Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 11. Biology to Machine Protocol (B2M): Middleware Architecture MCU Memory (Middleware Protocol) RX/TX Middleware HW Module MCU Memory (Middleware Protocol) RX/TX Gateway Device 802.11 MCU Memory (Middleware Protocol) RX/TX Middleware HW Module MCU Memory (Middleware Protocol) RX/TX Middleware HW Module Cloud Database Database Database Database Sensor Sensor Sensor Our ValueStrategic Suppliers X.Discovery Ø A Rata Data Ø A X.th-Structured Data Ø A Aggregated X.th-Structured Data Specific to Specimen Ø A X.Discovery Biological Application Data Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 12. Benefits Benefits of B2M Protocol Manufacture Perspective • Common data model among sensors developed by various manufactures. • Descriptive hierarchy of biology and associated quantities. • Efficient method for communicating describing characterizing biological quantities using the metric system. • Establishing a robust biological communication platform for rapid development and deployment independent of hardware and software systems. • Enabling customers to go to market faster. • Increases success rate with national regulations e.g. FDA (U.S.) • Minimizes interaction between human to animal disease transmission. • Enabling existing IoT devices to communicate with a unified biological protocol. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 13. Telebiometric Markets & Applications Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 14. Target Applications Port Entry Gaming Mobile Identity Environmental Impact TelemedicineAutomotive Safety Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 15. Contactless Commerce • Samsung Pay • Apple Pay • Alipay •Contactless Commerce supports: bank transfers, retail-stores, e-tailer, toll roads, parking meters, fast food restaurants, Banking Application: Contactless Payment Contactless Commerce Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 16. Digital Signage: • Determines biological qualities such as: gender, race, and age. • Targets advertisements tailored to demographics. • Ability to conduct contactless transactions Advertising: Tailored to Audience Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 17. Native Biometrics • 1st time biometrics is natively supported in an Operating System (Windows 10) and Intel Chipsets. • The FIDO Alliance has grown from six founding members in 2013 to some 200 this year. • Its goals are to encourage technology firms to eradicate passwords and enhance interoperability between authentication systems. Death to Passwords Fast IDentity Online (FIDO) Alliance Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 18. e-Health Baby monitor measures: • Heart Rate (beats per minute) • Body Temperature (C°/F°) • Oxygen Saturation (%) The monitor consists of a base station and a wristband with 3-sensors tuned to wetware thresholds for heart rate, temperature, and oxygen saturation quantification. The user sets alert ranges for each of the measurements. The wristband quantifies the biological target and transmits an encrypted ASN.1 packet back to the base station. When the baby “Life Signs” fall out of range and alert is enabled. Alerts parents to the possibility of Sudden Infant Death Syndrome (SIDS)! Healthcare Application: Baby Monitor Reducing Sudden Infant Death Syndrome (SIDS) Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 19. Telecomm Smart Watch measures: • Heart Rate (beats per minute) • Body Temperature (C°/F°) • Oxygen Saturation (%) • Location (GPS) • Lifestyle Informatics • Sleep monitor The Smart Watch is full featured offering more measurements which are transmitted over the mobile network. Healthcare providers can monitor and store patient’s vital signs and activity in the cloud provided they have matched authentication credentials. Enables a faster response time in critical situations. Lifestyle Application: Wearables Mobile Monitoring Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 20. Medical Equipment Tracking • Medical equipment methods and sensor threshold values are stored within the record data. • Gives healthcare provider a digital record of the medical equipment sensitivity and settings. Ensuring in a lawsuit that the patient was analyzed with proper equipment. Healthcare Application: Teleradiology Medical Equipment Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 21. Ambient Assisted Living In elderly care situations, a single senior citizen lives alone. Telebiometric motion sensors designed specifically for radiation emissions from a human body are placed through out the house. When a patient ceases to move the an alarm or phone can ring to check on patient’s status. Adjustable sensitivity allows for detection in sleep. Healthcare Application: Occupancy Home Health Activity Monitor for Assisted Living Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 22. It’s all about the data…… Telehealth = Telebiometrics + Telemedicine • Telehealth - is the use of electronic information and telecommunications technologies to support long-distance clinical health care, patient and professional health-related education, public health and health administration. • Telebiometrics – remote monitoring and reporting of biometric data. • Telemedicine - the remote diagnosis and treatment of patients by means of telecommunications technology. • Professor Enrico M. Staderini MD, PhD of Western Switzerland University of Applied Sciences discussed a quantified decision process for medical therapy from “Handbook of analytic philosophy of medicine” by Kazem Sadegh-Zadeh, Springer 2012. • Diagnosis in Medical treatment especially in Telemedicine is very dependent upon the quality of biological measurements. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 23. Remote Temperature Measurement Portable Thermal Imager measures: • Body Temperature (C°/F°) as calibrated to correlate with Radiation Emission wavelength In this case the unit is far (Tele) from the patient protecting the caregiver and can detect early symptoms of illness. Limits population exposure to a Pandemic Outbreak. Bio-surveillance Application: Port Entry Pandemic Detection Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 24. Benefits of Telebiometrics:  Contactless Biological Measurement. (Weight - kg, Body Temperature - C°, Heart Rate (bmp), Behavior  Reduces the risk to operators - No Cross Contamination.  Data is stored and viewed remotely.  Equipment is reusable no waste is produced reducing the risk of transmitting infection via garbage disposal.  Multiple/Sensors Digital Data outputs for cloud storage e.g. video, photo, temperature, depth, and more. Constant calibration built into system.  Scan time less than Forehead IR Spot Meter and cheaper than 3 months of 10KU usage.  Accurate body temperature measurements at eye/tear duct are within (+/- 1°C)  Processing is done on camera with alarm triggers (IR).  Can be combine with Passport Credentials/Global Entry system on a customer request basis. Bio-surveillance Application: Port Entry Pandemic Detection Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 25. IoT: Environmental Monitoring • Biological Surface Area determination • Water Surface Area Measurements • Ect. Chronic regional monitoring determines quality of biological entities and life sustaining resources. DEFORESTATION MONITORING Climate Change Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 26. IoT: Embedded Agriculture • Sunlight • Surface Temperature • Humidity • Water Cycles • Pesticide • Chemical Detection • Fertilization • Local Profile of plant species, seed date, crop batch, • Disease detection • Insect Infestation The monitor consists of a MEM based sensors, embedded memory, energy harvesting, and short range transceiver. The Farmer sets alert ranges for each plant species based upon required environmental interaction to maintain and optimize plant growth and harvesting. SMART AGRICULTURE: Creating Optimal Conditions for Life Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 27. Remote Livestock Monitoring Live Stock monitoring measures: • Heart Rate (beats per minute) • Body Temperature (C°/F°) • Oxygen Saturation (%) • Unique Identification • Disease Identification • Body Mass • Local Copy of Immunization records The remote monitoring limits human to animal disease transfer and reduces farm staff expenses. SMART FARM: Hands Off Husbandry Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 28. Collision Priority Back up cameras are becoming mandatory in the US under new government regulations in 2015 for vehicles with a display. Amending the law to include infrared detection tailored to human radiation emission would indicate to the driver that a life form is in the path of vehicle differentiating the obstacle from a bush. Automotive Application: Back up Camera Infrared Detection Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 29. Collision Avoidance Telebiometric sensors tuned the proper wavelength provides early detection in forward looking driving conditions. Protecting: • Cyclists • Joggers • Children • Animals • Passengers • The Car Automotive Application: Collision Avoidance Forward looking Infrared & Pattern Detection Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 30. Passenger Ambient Identification • Airbag deployment positioning • Customized multimedia settings, side mirrors, and seat adjustment • Seat belts enabled with heart monitoring/bio-signals (monitoring irritation or sleepiness) • Image capture for driver verification in accidents. • Driver activity log for commercial truckers. Automotive Application: Ambient Identification Customizable Settings Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 31. Urban Infographics High-Resolution Population Determination for 1st Responders. Telebiometrics Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 32. Current Draft Recommendation Activity Summary: Q9 Activity X.tam – draft recommendation specifies the implementation model and threats in the operating telebiometric systems in mobile devices and provides a general guideline for implementing Samsung Pay and Apple Pay. X.bhsm – draft recommendation supports Telebiometric authentication framework using biometric hardware security module. X.th2-6 – draft recommendation establishes a interaction model and forms a basis for Biology to Machine Protocol (B2M). X.pbact – draft recommendation establishes a framework for how telebiometric data is accessed in the cloud. Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur
  • 33. Join the Pack Contact Us John Caras John.Caras@Telebiometrics.com Facebook (50K+ Followers) (408) 387-4700 Introduction to Telebiometrics: Markets and Applications, John Caras, SG17/Q9 Rapporteur

Hinweis der Redaktion

  1. For many non-native English speaking people, I would like to mention that many words in English are a chain of Greek and Latin roots.
  2. Hardware: consists of sensor/actuator Nodes, Gateways, and Cloud computation platforms. Software entails embedded firmware, pre-determined thresholds for safe interaction, and pre/post processing applications executed in the cloud. Wetware is the idea that the body or any biological entity has elements of computational, structure, function or value.
  3. The body has borders Think about it in terms of computer ports. Can also be viewed as a Threat Matrix Discuss in and out Show how one builds upon the other. Discuss the need for standardized metrics in each field of study.