Myris Research Papers

Improved Essays
2a. The computer based innovation represented by my computational artifact is called Myris. Myris is a biometric security system that scans one’s iris to algorithmically process video images of the user’s eye signing them into secure websites, devices and other personal profiles. The intended purpose of Myris is to eliminate the utilization of standard passwords and to create a secure and foolproof method for accessing personal data. Simply put, “It lets anyone sign into accounts on websites or applications and unlock protected files with a quick glance into the mirror on its face” (http://dickinson.is/designing/eyelock/). My computational artifact illustrates the intended purpose of Myris by demonstrating the scanning of a person's eye. It also displays conceptual diagrams that map the iris. Lastly, I showcase a "wrong password case scenario".

2b. The computing tools I used to create my artifact included Google Images and Photoshop CS6. I compiled several images of the Myris eye scanner from Google images and also created a “wrong password” screen by editing the HTML code (inspect element) of the Google sign in page. These pictures were opened and edited utilizing the Photoshop CS6 software and the collage was created.
…show more content…
Myris has unrealized potential for simplifying password management. This device will prevent users from being locked out of important accounts in which passwords are not remembered. This is a common theme amongst many old and some mentally deficient users. They all suffer from what I call, “forgetful password syndrome (FPS).” Password retrieval has never been faster or more efficient than with the revolutionary Eyelock iris detector. “No more usernames. No more passwords. One look is all it takes to verify your identity. Myris gives you up to 1-in-1.5 million security. And it is as easy as using a mirror”

Related Documents

  • Improved Essays

    MIS101: Assignment

    • 559 Words
    • 3 Pages

    MIS101 – Assignment Template – Trimester 1, 2015 Your Name: Costa Banias Student Number: 215162709 Deakin Email: cbanias@deakin.edu.au Assignment – Part A Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The article then goes on to talk about the current ways that we are using technology in biometrics. These include voice, DNA, facial features, and more.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    As a business owner, you are always looking for methods of improving the efficiency of your business. Time theft has been an almost timeless concern in the workplace, and using the outdated time cards, you leave a vulnerability open because buddy punching means that even if your employees are late to work, they can have a friend clock in for them. With the fingerprint attendance system from MinuteHound, the technology virtually eliminates time theft. Over the last century, fingerprints have served as a foundation for identification in crimes, and it has helped us to keep track of people.…

    • 463 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Raez Research Papers

    • 1891 Words
    • 8 Pages

    All the great design houses are unveiling their Spring and Fall lines for 2007. While it would be wonderful to be able to drop several thousand dollars on a jacket or skirt, it just isn't feasible for most shoppers when they consider the fact that the garment they buy this season will be out of style next season. It will be the fashion world's equivalent to what your wrap fish in - yesterday's news. Fashion trends and designers are fickle creatures. Sure, whatever you buy this year may be back in style in 20 years or so, but who wants to buy something they can only wear a couple times every 20 years?…

    • 1891 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Boros Research Papers

    • 579 Words
    • 3 Pages

    "No one goes that far West alone, nothin but trolls and dragons big enough to swallow Generations of families in one gulp. "~ Retired soldier The land of Boros is a tough one, villages are connected via trade routes that zig zag all over the western continent. All the while having to contend with beasts of varying races and sizes constantly proving a problem every day. But the people of this land manage.…

    • 579 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Lily Rosenthal Mr. Baugh U.S. History—Per. 7 11 December 2015 Historical Investigation Research Paper On July 5th, 1865 an agency was created called the United States Secret Service. To this day, it remains an important part of keeping the U.S. safe. Its purpose is to serve as protection for chief individuals and their families—specifically the president.…

    • 1729 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Plea Research Papers

    • 738 Words
    • 3 Pages

    The Plea Brittany Johnson Houston Community College Abstract My reflection will be on individuals having to take the plea deal when being convicted. Some questions I will bring into this research topic would be; Why are individuals taking the plea deal so freely? Why would lawyers not want to take the case to trial? Who are the type of individuals having to go through this?…

    • 738 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    I will be drawing arguments and research results from theorists such as Monahan (2011), Bullingham and Vasconcelos (2013), and DeVries (2003) in order to argue the amount of lateral surveillance practiced in the gaming world (in other words: lack of privacy) that can be associated with the idea of users wanting to not only present their “best self” to those watching, but to also prove their “best self”, and be the best “best self.” With the advancements of technology throughout the years, lateral surveillance opportunities emerged within the online world, and had especially grown in popularity through online video game platforms. The idea that this peer-to-peer communication has flourished so effectively puts concern on both the sudden invasive powers users have on one another, and on…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Fidelity Research Papers

    • 721 Words
    • 3 Pages

    “When a man says he promises anything, he in effect expresses a resolution of performing it; and along with that, by making use of this form of words, subjects himself to the penalty of never being trusted again in case of failure.” ( Kampowski, p. 3) Jason and Lily are a newlywed couple that has wondered what the real meaning of fidelity is. For many months, Lily and Jason researched the meaning. The couple went through a rough time finding answers, but in the end they found the meaning of fidelity.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data Mining Essay

    • 798 Words
    • 4 Pages

    The topic that I am interested in is Data Mining. This is interesting to me because it can help in various areas of society. This includes the medical field, elderly care, and commerce. This is controversial because of the amount and type of personal data that is being collected. We are living in the “Big Data” era where there are many ways to collect data.…

    • 798 Words
    • 4 Pages
    Improved Essays