SlideShare a Scribd company logo
1 of 13
eMedicalFiles, Inc. December 2008 Hector Reyes, MD, MBA Sr. Vice President IntelliFinger Presentation
eMedicalFiles, Inc. Objective ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Growing Importance of  Electronic Health Data Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IntelliFinger™ is in full compliance or enabled
Pending Regulatory Requirements  ,[object Object],[object Object],[object Object],IntelliFinger™ fully meets or exceeds these requirements
Biometric Scanner   IntelliFinger™  Patient Authentication Image Processing Template Biometric Capture Secure Storage Image Unique Patient Identifier
IntelliFinger™ Image Processing Biometric finger image immediately converted to mathematical data string of 0’s and 1’s that cannot be reverse engineered to match a finger image. Protected Health Information Secure Data Warehouse Web-Based 24/7 Anywhere IntelliFinger ™ Biometric  Scanner Real-time Patient Authentication
Product  Form-Factors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Patient Benefits Advisor™
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits from Integration
Unique Patient Identifier applied biometrically to link  previous duplicate records and to  prevent it  from occurring in  the future   Duplicate Record Reduction/Avoidance
System Architecture  Physical Diagram
IntelliFinger™ Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...JAYAPRAKASH JPINFOTECH
 
Medical Devices for Remote and Distributed Care
Medical Devices for Remote and Distributed Care Medical Devices for Remote and Distributed Care
Medical Devices for Remote and Distributed Care VSee
 
Aesthetics pro online-Software Finder
Aesthetics pro online-Software FinderAesthetics pro online-Software Finder
Aesthetics pro online-Software FinderSoftware Finder
 
Patient portals and personal health apps in New Zealand
Patient portals and personal health apps in New ZealandPatient portals and personal health apps in New Zealand
Patient portals and personal health apps in New ZealandAlastair Kenworthy
 
IOT is the Future of Healthcare (Logtel IOT conference May 2014)
IOT is the Future of Healthcare (Logtel IOT conference May 2014)IOT is the Future of Healthcare (Logtel IOT conference May 2014)
IOT is the Future of Healthcare (Logtel IOT conference May 2014)Ofer Atzmon
 
It a cure for healthcare arab health january 2013 -final
It a cure for healthcare   arab health january 2013 -finalIt a cure for healthcare   arab health january 2013 -final
It a cure for healthcare arab health january 2013 -finalhydadvertising
 
BestConsent-Datasheet
BestConsent-DatasheetBestConsent-Datasheet
BestConsent-DatasheetDouglas Brown
 
Biometric Authentication Systems in Healthcare
Biometric Authentication Systems in HealthcareBiometric Authentication Systems in Healthcare
Biometric Authentication Systems in HealthcareBharath Perugu
 
Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...JAYAPRAKASH JPINFOTECH
 
HL7 January 2013
HL7 January 2013HL7 January 2013
HL7 January 2013Barry Smith
 
HealthAsyst Product Offerings v3 0
HealthAsyst Product Offerings v3 0HealthAsyst Product Offerings v3 0
HealthAsyst Product Offerings v3 0Cathleen Larson
 
Estonian experience in digital healthcare
Estonian experience in digital healthcareEstonian experience in digital healthcare
Estonian experience in digital healthcareAleksandr Kormiltsyn
 
Stark Exceptions 20080325
Stark Exceptions 20080325Stark Exceptions 20080325
Stark Exceptions 20080325Andy Spooner
 

What's hot (20)

Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...
 
Cloud EMR software
Cloud EMR softwareCloud EMR software
Cloud EMR software
 
Medical Devices for Remote and Distributed Care
Medical Devices for Remote and Distributed Care Medical Devices for Remote and Distributed Care
Medical Devices for Remote and Distributed Care
 
Health-e-cITi NJ
Health-e-cITi NJHealth-e-cITi NJ
Health-e-cITi NJ
 
Hospital Information Management System - HIMS
 Hospital Information Management System - HIMS  Hospital Information Management System - HIMS
Hospital Information Management System - HIMS
 
Nortec
NortecNortec
Nortec
 
Digitalisierung mit ConSol CM
Digitalisierung mit ConSol CMDigitalisierung mit ConSol CM
Digitalisierung mit ConSol CM
 
Aesthetics pro online-Software Finder
Aesthetics pro online-Software FinderAesthetics pro online-Software Finder
Aesthetics pro online-Software Finder
 
Patient portals and personal health apps in New Zealand
Patient portals and personal health apps in New ZealandPatient portals and personal health apps in New Zealand
Patient portals and personal health apps in New Zealand
 
IOT is the Future of Healthcare (Logtel IOT conference May 2014)
IOT is the Future of Healthcare (Logtel IOT conference May 2014)IOT is the Future of Healthcare (Logtel IOT conference May 2014)
IOT is the Future of Healthcare (Logtel IOT conference May 2014)
 
It a cure for healthcare arab health january 2013 -final
It a cure for healthcare   arab health january 2013 -finalIt a cure for healthcare   arab health january 2013 -final
It a cure for healthcare arab health january 2013 -final
 
BestConsent-Datasheet
BestConsent-DatasheetBestConsent-Datasheet
BestConsent-Datasheet
 
Biometric Authentication Systems in Healthcare
Biometric Authentication Systems in HealthcareBiometric Authentication Systems in Healthcare
Biometric Authentication Systems in Healthcare
 
Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...Delegated Authorization Framework for HER Services using Attribute Based Encr...
Delegated Authorization Framework for HER Services using Attribute Based Encr...
 
HealthAsyst Products Overview FINAL
HealthAsyst Products Overview FINALHealthAsyst Products Overview FINAL
HealthAsyst Products Overview FINAL
 
HL7 January 2013
HL7 January 2013HL7 January 2013
HL7 January 2013
 
HealthAsyst Product Offerings v3 0
HealthAsyst Product Offerings v3 0HealthAsyst Product Offerings v3 0
HealthAsyst Product Offerings v3 0
 
Estonian experience in digital healthcare
Estonian experience in digital healthcareEstonian experience in digital healthcare
Estonian experience in digital healthcare
 
Stark Exceptions 20080325
Stark Exceptions 20080325Stark Exceptions 20080325
Stark Exceptions 20080325
 
MedITEX IVF
MedITEX IVFMedITEX IVF
MedITEX IVF
 

Viewers also liked

CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer ScienceCSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Scienceciakov
 
Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2lesleywalters3333
 
Website worth calculator
Website worth calculatorWebsite worth calculator
Website worth calculatorAlpha Click
 
The role-of-digital-in-tv articles (1) (1)
The role-of-digital-in-tv articles (1) (1)The role-of-digital-in-tv articles (1) (1)
The role-of-digital-in-tv articles (1) (1)Greg Sterling
 
Computer and information research scientists
Computer and information research scientistsComputer and information research scientists
Computer and information research scientistsisabel valle
 
Mini research computer game based
Mini research computer game basedMini research computer game based
Mini research computer game basedAyuni Abdullah
 
Fingerprint scanner (nitish ranjan)
Fingerprint scanner (nitish ranjan)Fingerprint scanner (nitish ranjan)
Fingerprint scanner (nitish ranjan)Nitish Ranjan
 
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...tedster777
 
Calculator scientific
Calculator scientificCalculator scientific
Calculator scientificAnil Sharma
 
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...Daedal Research
 

Viewers also liked (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Face morphing
Face morphingFace morphing
Face morphing
 
CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer ScienceCSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Science
 
Using A FInancial Calculator
Using A FInancial CalculatorUsing A FInancial Calculator
Using A FInancial Calculator
 
Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2
 
Website worth calculator
Website worth calculatorWebsite worth calculator
Website worth calculator
 
The role-of-digital-in-tv articles (1) (1)
The role-of-digital-in-tv articles (1) (1)The role-of-digital-in-tv articles (1) (1)
The role-of-digital-in-tv articles (1) (1)
 
Computer and information research scientists
Computer and information research scientistsComputer and information research scientists
Computer and information research scientists
 
Finer print scanner
Finer print scannerFiner print scanner
Finer print scanner
 
Mini research computer game based
Mini research computer game basedMini research computer game based
Mini research computer game based
 
Fingerprint scanner (nitish ranjan)
Fingerprint scanner (nitish ranjan)Fingerprint scanner (nitish ranjan)
Fingerprint scanner (nitish ranjan)
 
Future Mobile Research
Future Mobile ResearchFuture Mobile Research
Future Mobile Research
 
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...
Writing The Research Paper A Handbook (7th ed) - Ch 5 computers and the resea...
 
Triple Bottom Line Calculator
Triple Bottom Line CalculatorTriple Bottom Line Calculator
Triple Bottom Line Calculator
 
Calculator scientific
Calculator scientificCalculator scientific
Calculator scientific
 
Using the scientific calculator
Using the scientific calculatorUsing the scientific calculator
Using the scientific calculator
 
Loan Calculator
Loan CalculatorLoan Calculator
Loan Calculator
 
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...
Global Air Conditioner Market: Size, Trends and Forecasts (2016-2020) - New R...
 
Airtel DTH
Airtel DTHAirtel DTH
Airtel DTH
 

Similar to Intelli Finger Presentation

November 2008 E Newsletter
November 2008 E NewsletterNovember 2008 E Newsletter
November 2008 E NewsletterJudson P. Bruno
 
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueHealthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueIRJET Journal
 
iTel Brochure 2015
iTel Brochure 2015 iTel Brochure 2015
iTel Brochure 2015 Ron Richard
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health RecordAnurag Deb
 
IoT in Healthcare-The Role of IoT in Healthcare.pptx
IoT in Healthcare-The Role of IoT in Healthcare.pptxIoT in Healthcare-The Role of IoT in Healthcare.pptx
IoT in Healthcare-The Role of IoT in Healthcare.pptxmodafinil hub
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsCitiusTech
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealthJoe Drumgoole
 
Biometric Fusion & Future of Healthcare.pdf
Biometric Fusion & Future of Healthcare.pdfBiometric Fusion & Future of Healthcare.pdf
Biometric Fusion & Future of Healthcare.pdfBahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in HealthcareBahaa Abdulhadi
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare OverviewBrock Spradling
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copyCISgroup
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copyCISgroup
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 

Similar to Intelli Finger Presentation (20)

November 2008 E Newsletter
November 2008 E NewsletterNovember 2008 E Newsletter
November 2008 E Newsletter
 
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueHealthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the Rescue
 
iTel Brochure 2015
iTel Brochure 2015 iTel Brochure 2015
iTel Brochure 2015
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health Record
 
IoT in Healthcare-The Role of IoT in Healthcare.pptx
IoT in Healthcare-The Role of IoT in Healthcare.pptxIoT in Healthcare-The Role of IoT in Healthcare.pptx
IoT in Healthcare-The Role of IoT in Healthcare.pptx
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of Things
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealth
 
Biometric Fusion & Future of Healthcare.pdf
Biometric Fusion & Future of Healthcare.pdfBiometric Fusion & Future of Healthcare.pdf
Biometric Fusion & Future of Healthcare.pdf
 
Next Gen EHR Revolutionizing Healthcare Data Management
Next Gen EHR Revolutionizing Healthcare Data ManagementNext Gen EHR Revolutionizing Healthcare Data Management
Next Gen EHR Revolutionizing Healthcare Data Management
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
E Health Trust
E Health TrustE Health Trust
E Health Trust
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare Overview
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copy
 
Clinical information system-final copy
Clinical information system-final copyClinical information system-final copy
Clinical information system-final copy
 
CCPL. HIS
CCPL. HISCCPL. HIS
CCPL. HIS
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Intelli Finger Presentation

  • 1. eMedicalFiles, Inc. December 2008 Hector Reyes, MD, MBA Sr. Vice President IntelliFinger Presentation
  • 2.
  • 3.
  • 4.
  • 5. Biometric Scanner IntelliFinger™ Patient Authentication Image Processing Template Biometric Capture Secure Storage Image Unique Patient Identifier
  • 6. IntelliFinger™ Image Processing Biometric finger image immediately converted to mathematical data string of 0’s and 1’s that cannot be reverse engineered to match a finger image. Protected Health Information Secure Data Warehouse Web-Based 24/7 Anywhere IntelliFinger ™ Biometric Scanner Real-time Patient Authentication
  • 7.
  • 9.
  • 10. Unique Patient Identifier applied biometrically to link previous duplicate records and to prevent it from occurring in the future Duplicate Record Reduction/Avoidance
  • 11. System Architecture Physical Diagram
  • 12.
  • 13.  

Editor's Notes

  1. 06/08/09