The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring information protection, then Thumb Access is what you need.
Thumb Access links you to all your accounts whether on SNS, Chat Messengers, E-mail or with your Bank through one medium – your thumbprint. Like is widely known, only the human thumbprint is unique to every individual as no two persons have the same finger-print features. This makes Thumb Access far safer than passwords which are prone to hacking, formatting or can even be forgotten.
Thumb Access works in a way that specifically eliminates any fears of intrusion to one’s protected information. All that protection comes without cramming or writing passwords; it simply demands registering your thumbprint with every account you own. Now you can be sure that your next mail, tweet, chat message or even bank transaction is just a thumbprint away
How does it work?
The software comes pre-loaded on mobile phones that operate touch-capabilities, i.e. touchscreens, as part of the System Software. Once purchased and ready to use, the user is required to register his or her thumbprint (preferably the right thumb) as part of the start-up procedures.
The user also is required to register his or her SNS, Chat Messenger, E-mail as well as Bank accounts with the thumbprint as an access code. Once this stage is completed, regular settings will follow. As a result, the thumbprint will also serve as the phone code covering the various codes that can be used on mobile phones.
So when you need to unlock your phone, view your mails, access your SNS or chat, your thumbprint will be requested for as your pre-registered access code. No password required! Now you can open as many accounts you want on the variety of sites as you won’t need to rack your brain over a forgotten password.
Also, the thumbprint is saved on a central database along with your phone details for retrieval and phone security purposes.
Can I change settings on my Thumb Access?
Sure enough, the application is absolutely user-friendly permitting controlled changes in settings for customer satisfaction. Any change in settings will demand the pre-registered thumbprint so as to prevent intrusion. With this and more, you have it all the more secure.
How does the App improve security?
As a user, your accounts are safe against unwanted intrusions while your phone accessibility is controlled. You also get to track and find the location of your phone if lost or stolen thus going a long way in helping Police Investigations.
Since your phone will demand access code every two hours and for every attempt at unlocking (Preset), any unauthorized use through theft leaves the suspect without any means of using or changing any settings. This technology will also curb phone theft as stealing an access-protected phone will be unappealing. THANK YOU
THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY
1. RCCG LP25 GIICT
WINNERS
THUMBS ON – ACCESS ALL YOUR
ACCOUNTS SAME WAY, SAFEST WAY
TECHNOVATION CHALLENGE
Digital inclusion for this
generation and the next
The RCCG LP25 Technovation
2. Technology in 21st Century Skills
• We are a team of young teenage girls from under the
Teens Church arm one of the Provincial Headquarters
of the Redeemed Christian Church of God in Lagos
and we are excellence-oriented people running with a
globally-impactful vision. Our team name is RCCG
LP25 GIICT WINNERS and the names of our team
members are as follows:-
Digital inclusion for this
generation and the next
3. Importance of Technology
in Schools
As technology is bound to rule our present and
future, it is good to obtain a know how of the
technological reforms at the earliest. Children learn
faster and can adapt to changes relatively easily. If
they are trained during their school years, they have
high chances of becoming experts in technology. An
early beginning is always beneficial in the long run.
When we know that technology is bound to be a part
of their future, it is best to introduce them to it during
school life. Instead of seeing them, struggle with
learning later in life, it is advisable to give them a
basic idea of the technological reforms
Digital inclusion for this
generation and the next
4. PRESENTED BY
Uramu Maryann, 17
Ekechukwu Rachel, 17
Akingba Gladys, 14
Edozie Oluchi, 14
Ogunleye Oluwatosin, 18
Digital inclusion for this
generation and the next
5. Introducing the Thumb Access
Technology
The Thumb Access is a software technology
that aims at improving phone security and
contributing to global crime control. If you
are looking for that software that eases
mental stress while ensuring information
protection, then Thumb Access is what you
need.
Digital inclusion for this
generation and the next
6. Introducing the Thumb Access
Technology
Thumb Access links you to all your accounts
whether on SNS, Chat Messengers, E-mail or
with your Bank through one medium – your
thumbprint. Like is widely known, only the
human thumbprint is unique to every
individual as no two persons have the same
finger-print features. This makes Thumb
Access far safer than passwords which are
prone to hacking, formatting or can even be
Digital inclusion for this
forgotten. generation and the next
7. Introducing the Thumb Access
Technology
Thumb Access works in a way that
specifically eliminates any fears of intrusion
to one’s protected information. All that
protection comes without cramming or
writing passwords; it simply demands
registering your thumbprint with every
account you own. Now you can be sure that
your next mail, tweet, chat message or even
bank transaction is just a thumbprint away.
Digital inclusion for this
generation and the next
9. THUMBS ON – ACCESS ALL YOUR
ACCOUNTS SAME WAY, SAFEST WAY
Fig a
Fig b
Fig e Fig d
Fig c
Digital inclusion for this
generation and the next
10. How does it work?
The software comes pre-loaded on mobile
phones that operate touch-capabilities, i.e.
touchscreens, as part of the System Software.
Once purchased and ready to use, the user is
required to register his or her thumbprint
(preferably the right thumb) as part of the
start-up procedures.
Digital inclusion for this
generation and the next
11. How does it work?
The user also is required to register his or her
SNS, Chat Messenger, E-mail as well as Bank
accounts with the thumbprint as an access
code. Once this stage is completed, regular
settings will follow. As a result, the thumbprint
will also serve as the phone code covering the
various codes that can be used on mobile
phones.
Digital inclusion for this
generation and the next
12. How does it work?
Sowhen you need to unlock your phone, view
your mails, access your SNS or chat, your
thumbprint will be requested for as your pre-
registered access code. No password
required! Now you can open as many
accounts you want on the variety of sites as
you won’t need to rack your brain over a
forgotten password.
Digital inclusion for this
generation and the next
13. How does it work?
Also, the thumbprint is saved
on a central database along with
your phone details for retrieval
and phone security purposes.
Digital inclusion for this
generation and the next
14. Can I change settings on
my Thumb Access?
Sure enough, the application is
absolutely user-friendly permitting
controlled changes in settings for
customer satisfaction. Any change in
settings will demand the pre-registered
thumbprint so as to prevent intrusion.
With this and more, you have it all the
more secure. Digital inclusion for this
generation and the next
15. How does the App improve
security?
Asa user, your accounts are safe
against unwanted intrusions while your
phone accessibility is controlled. You
also get to track and find the location of
your phone if lost or stolen thus going a
long way in helping Police
Investigations.
Digital inclusion for this
generation and the next
16. How does the App improve
security?
Since your phone will demand access code
every two hours and for every attempt at
unlocking (Preset), any unauthorized use
through theft leaves the suspect without any
means of using or changing any settings. This
technology will also curb phone theft as
stealing an access-protected phone will be
unappealing. Since the application will be
operating under system software, it will not be
Digital inclusion for this
liable to formatting. generation and the next
17. How does the App improve
security?
Sincethe phone will only be sold at
designated retail centers, road-side sale of
stolen phones will be considered illegal and
termed as a criminal act. Robbery suspect will
also be tracked using the stolen phone and it
can be found even after being discarded.
Change of SIM cards will be irrelevant to
decoding or unlocking the phone.
Digital inclusion for this
generation and the next
18. How does the App improve
security?
Country security can be greatly improved through
linking it with the appropriate database thus giving
possible monitoring of migrations. The user can
also set the thumbprint as a permission code for
switching of the phone. In order to preserve
necessary information, time changes will
immediately occur with a change in time zones. All
users need to do is to notify the phone/software
manufacturers on the theft of their phones,
information on the phone location will be
Digital inclusion for this
immediately sent to the user. generation and the next
19. Can I use/find the software
on any phone?
Thumb Access is only available on
touch-enabled phones and will be
available for Symbian OS, Windows
OS, Web OS, Android OS, i-OS,
Blackberry OS and other
collaborating touch-enabled phone
categories.
Digital inclusion for this
generation and the next
20. THANK YOU SEE YOU ALL AT
THE TOP
Thank You for Listening!
IT TAKES A GOOD PROCESS
TO BRING OUT A GOOD
PRODUCT
Notas del editor
What are 21 st century skills? True technology and media literacy Effective communication Critical thinking Problem solving And…collaboration The best learning environment to acquire these skills is an “eLearning” environment Access to ICT (Information and Communication Technology) has emerged as a key strategy to take education to a new level – by creating effective eLearning environments
[This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
[This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
[This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
Whether you’re introducing or expanding ICT in your schools, successful implementation takes several key components working together: Strong technology Connectivity Professional development Improved learning methods and Digital curriculum All of these contribute to an eLearning environment where 21st century skills flourish and students thrive. Technology: PCs, servers, PDA/handhelds, cell phones, iPods*. Also: Wired communications and computing networks; wireless communications and computing networks. Connectivity: Wired or wireless. Wi-Fi and WiMAX are optimum. Professional development: Many flavors available. Intel’s Teach to the Future program offers professional development for teachers in 35 countries today. Improved learning methods: Student-centric learning, project-based learning, group collaboration, goal of developing higher-order thinking skills. Digital curriculum: Includes digital content, but is not the same thing as digital content. A digital curriculum is a teaching/learning approach that assumes that technology and connectivity are involved, and that takes advantage of those. So lesson plans are different, resources are different, AND the content is digital (from the Net, multimedia, CD-ROM, etc. – electronic-based, not paper-based).