SlideShare una empresa de Scribd logo
1 de 20
 

     RCCG LP25 GIICT
          WINNERS
     THUMBS ON – ACCESS ALL YOUR
    ACCOUNTS SAME WAY, SAFEST WAY

                             TECHNOVATION CHALLENGE



                                          Digital inclusion for this
                                          generation and the next
The RCCG LP25 Technovation
Technology in 21st Century Skills

  • We are a team of young teenage girls from under the
    Teens Church arm one of the Provincial Headquarters
    of the Redeemed Christian Church of God in Lagos
    and we are excellence-oriented people running with a
    globally-impactful vision. Our team name is RCCG
    LP25 GIICT WINNERS and the names of our team
    members are as follows:-
                                      Digital inclusion for this
                                      generation and the next
Importance of Technology
           in Schools
   As technology is bound to rule our present and
    future, it is good to obtain a know how of the
    technological reforms at the earliest. Children learn
    faster and can adapt to changes relatively easily. If
    they are trained during their school years, they have
    high chances of becoming experts in technology. An
    early beginning is always beneficial in the long run.
    When we know that technology is bound to be a part
    of their future, it is best to introduce them to it during
    school life. Instead of seeing them, struggle with
    learning later in life, it is advisable to give them a
    basic idea of the technological reforms
                                             Digital inclusion for this
                                             generation and the next
PRESENTED BY
Uramu  Maryann, 17
Ekechukwu Rachel, 17
Akingba Gladys, 14
Edozie Oluchi, 14
Ogunleye Oluwatosin, 18
                    Digital inclusion for this
                    generation and the next
Introducing the Thumb Access
                 Technology

 The Thumb Access is a software technology
 that aims at improving phone security and
 contributing to global crime control. If you
 are looking for that software that eases
 mental stress while ensuring information
 protection, then Thumb Access is what you
 need.

                               Digital inclusion for this
                               generation and the next
Introducing the Thumb Access
               Technology

 Thumb  Access links you to all your accounts
 whether on SNS, Chat Messengers, E-mail or
 with your Bank through one medium – your
 thumbprint. Like is widely known, only the
 human thumbprint is unique to every
 individual as no two persons have the same
 finger-print features. This makes Thumb
 Access far safer than passwords which are
 prone to hacking, formatting or can even be
                                 Digital inclusion for this
 forgotten.                      generation and the next
Introducing the Thumb Access
                 Technology

 Thumb     Access works in a way that
    specifically eliminates any fears of intrusion
    to one’s protected information. All that
    protection comes without cramming or
    writing passwords; it simply demands
    registering your thumbprint with every
    account you own. Now you can be sure that
    your next mail, tweet, chat message or even
    bank transaction is just a thumbprint away.
                                    Digital inclusion for this
                                   generation and the next
Technology Environments




                    Digital inclusion for this
                    generation and the next
THUMBS ON – ACCESS ALL YOUR
ACCOUNTS SAME WAY, SAFEST WAY




         Fig a
                                                  Fig b




                 Fig e                            Fig d
 Fig c

                         Digital inclusion for this
                         generation and the next
How does it work?


 The software comes pre-loaded on mobile
 phones that operate touch-capabilities, i.e.
 touchscreens, as part of the System Software.
 Once purchased and ready to use, the user is
 required to register his or her thumbprint
 (preferably the right thumb) as part of the
 start-up procedures.


                                Digital inclusion for this
                                generation and the next
How does it work?


 The user also is required to register his or her
 SNS, Chat Messenger, E-mail as well as Bank
 accounts with the thumbprint as an access
 code. Once this stage is completed, regular
 settings will follow. As a result, the thumbprint
 will also serve as the phone code covering the
 various codes that can be used on mobile
 phones.
                                   Digital inclusion for this
                                   generation and the next
How does it work?


 Sowhen you need to unlock your phone, view
 your mails, access your SNS or chat, your
 thumbprint will be requested for as your pre-
 registered access code. No password
 required! Now you can open as many
 accounts you want on the variety of sites as
 you won’t need to rack your brain over a
 forgotten password.
                                Digital inclusion for this
                                generation and the next
How does it work?


Also, the thumbprint is saved
 on a central database along with
 your phone details for retrieval
 and phone security purposes.


                       Digital inclusion for this
                       generation and the next
Can I change settings on
  my Thumb Access?

 Sure enough, the application is
 absolutely user-friendly permitting
 controlled changes in settings for
 customer satisfaction. Any change in
 settings will demand the pre-registered
 thumbprint so as to prevent intrusion.
 With this and more, you have it all the
 more secure.                 Digital inclusion for this
                                        generation and the next
How does the App improve
         security?

 Asa user, your accounts are safe
 against unwanted intrusions while your
 phone accessibility is controlled. You
 also get to track and find the location of
 your phone if lost or stolen thus going a
 long way in helping Police
 Investigations.
                              Digital inclusion for this
                              generation and the next
How does the App improve
          security?

 Since your phone will demand access code
 every two hours and for every attempt at
 unlocking (Preset), any unauthorized use
 through theft leaves the suspect without any
 means of using or changing any settings. This
 technology will also curb phone theft as
 stealing an access-protected phone will be
 unappealing. Since the application will be
 operating under system software, it will not be
                                  Digital inclusion for this
 liable to formatting.           generation and the next
How does the App improve
          security?

 Sincethe phone will only be sold at
 designated retail centers, road-side sale of
 stolen phones will be considered illegal and
 termed as a criminal act. Robbery suspect will
 also be tracked using the stolen phone and it
 can be found even after being discarded.
 Change of SIM cards will be irrelevant to
 decoding or unlocking the phone.
                                 Digital inclusion for this
                                 generation and the next
How does the App improve
             security?

   Country security can be greatly improved through
    linking it with the appropriate database thus giving
    possible monitoring of migrations. The user can
    also set the thumbprint as a permission code for
    switching of the phone. In order to preserve
    necessary information, time changes will
    immediately occur with a change in time zones. All
    users need to do is to notify the phone/software
    manufacturers on the theft of their phones,
    information on the phone location will be
                                          Digital inclusion for this
    immediately sent to the user.         generation and the next
Can I use/find the software
        on any phone?

Thumb   Access is only available on
 touch-enabled phones and will be
 available for Symbian OS, Windows
 OS, Web OS, Android OS, i-OS,
 Blackberry OS and other
 collaborating touch-enabled phone
 categories.
                          Digital inclusion for this
                          generation and the next
THANK YOU SEE YOU ALL AT
        THE TOP

    Thank You for Listening!




                      IT TAKES A GOOD PROCESS
                        TO BRING OUT A GOOD
                             PRODUCT

Más contenido relacionado

La actualidad más candente

Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
jraja01
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
STO STRATEGY
 

La actualidad más candente (19)

NFC
NFCNFC
NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
 
IRJET- A Review on Iot Based Sign Language Conversion
IRJET-  	  A Review on Iot Based Sign Language ConversionIRJET-  	  A Review on Iot Based Sign Language Conversion
IRJET- A Review on Iot Based Sign Language Conversion
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
State of the Market
State of the MarketState of the Market
State of the Market
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry pi
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
 
NFC wallet
NFC walletNFC wallet
NFC wallet
 
UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field Communication
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile Loyalty
 

Destacado

College management system
College management systemCollege management system
College management system
Aditya Kiran
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
PRADEEP Cheekatla
 
Online examination system
Online examination systemOnline examination system
Online examination system
Rahul Khanwani
 

Destacado (20)

Member and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce GroupMember and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce Group
 
Online examination software eduexam
Online examination software eduexamOnline examination software eduexam
Online examination software eduexam
 
College management system
College management systemCollege management system
College management system
 
Vehicle accident report slideshare
Vehicle accident report slideshareVehicle accident report slideshare
Vehicle accident report slideshare
 
Railway gate cct project report-Diploma Project
Railway gate cct project report-Diploma ProjectRailway gate cct project report-Diploma Project
Railway gate cct project report-Diploma Project
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Project Management
Project ManagementProject Management
Project Management
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
 
Automated Bus Ticket Booking System
Automated Bus Ticket Booking System Automated Bus Ticket Booking System
Automated Bus Ticket Booking System
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Academic management
Academic managementAcademic management
Academic management
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Online Bus Reservation System
Online Bus Reservation SystemOnline Bus Reservation System
Online Bus Reservation System
 
railway reservation software documentaion
railway reservation software documentaionrailway reservation software documentaion
railway reservation software documentaion
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentation
 

Similar a THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY

E business-ppt
E business-pptE business-ppt
E business-ppt
netsmartzz
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
JAN HICKEY
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Marta Kusinska
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
DevConFu
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
Allan Isfan
 

Similar a THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY (20)

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
How to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdfHow to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdf
 
E business-ppt
E business-pptE business-ppt
E business-ppt
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhone
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
How RelyPass Simplifies Password Management
How RelyPass Simplifies Password ManagementHow RelyPass Simplifies Password Management
How RelyPass Simplifies Password Management
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 

Último

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Último (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY

  • 1.   RCCG LP25 GIICT WINNERS THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY TECHNOVATION CHALLENGE Digital inclusion for this generation and the next The RCCG LP25 Technovation
  • 2. Technology in 21st Century Skills • We are a team of young teenage girls from under the Teens Church arm one of the Provincial Headquarters of the Redeemed Christian Church of God in Lagos and we are excellence-oriented people running with a globally-impactful vision. Our team name is RCCG LP25 GIICT WINNERS and the names of our team members are as follows:- Digital inclusion for this generation and the next
  • 3. Importance of Technology in Schools  As technology is bound to rule our present and future, it is good to obtain a know how of the technological reforms at the earliest. Children learn faster and can adapt to changes relatively easily. If they are trained during their school years, they have high chances of becoming experts in technology. An early beginning is always beneficial in the long run. When we know that technology is bound to be a part of their future, it is best to introduce them to it during school life. Instead of seeing them, struggle with learning later in life, it is advisable to give them a basic idea of the technological reforms Digital inclusion for this generation and the next
  • 4. PRESENTED BY Uramu Maryann, 17 Ekechukwu Rachel, 17 Akingba Gladys, 14 Edozie Oluchi, 14 Ogunleye Oluwatosin, 18 Digital inclusion for this generation and the next
  • 5. Introducing the Thumb Access Technology  The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring information protection, then Thumb Access is what you need. Digital inclusion for this generation and the next
  • 6. Introducing the Thumb Access Technology  Thumb Access links you to all your accounts whether on SNS, Chat Messengers, E-mail or with your Bank through one medium – your thumbprint. Like is widely known, only the human thumbprint is unique to every individual as no two persons have the same finger-print features. This makes Thumb Access far safer than passwords which are prone to hacking, formatting or can even be Digital inclusion for this forgotten. generation and the next
  • 7. Introducing the Thumb Access Technology  Thumb Access works in a way that specifically eliminates any fears of intrusion to one’s protected information. All that protection comes without cramming or writing passwords; it simply demands registering your thumbprint with every account you own. Now you can be sure that your next mail, tweet, chat message or even bank transaction is just a thumbprint away. Digital inclusion for this  generation and the next
  • 8. Technology Environments Digital inclusion for this generation and the next
  • 9. THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY Fig a Fig b Fig e Fig d Fig c Digital inclusion for this generation and the next
  • 10. How does it work?  The software comes pre-loaded on mobile phones that operate touch-capabilities, i.e. touchscreens, as part of the System Software. Once purchased and ready to use, the user is required to register his or her thumbprint (preferably the right thumb) as part of the start-up procedures. Digital inclusion for this generation and the next
  • 11. How does it work?  The user also is required to register his or her SNS, Chat Messenger, E-mail as well as Bank accounts with the thumbprint as an access code. Once this stage is completed, regular settings will follow. As a result, the thumbprint will also serve as the phone code covering the various codes that can be used on mobile phones. Digital inclusion for this generation and the next
  • 12. How does it work?  Sowhen you need to unlock your phone, view your mails, access your SNS or chat, your thumbprint will be requested for as your pre- registered access code. No password required! Now you can open as many accounts you want on the variety of sites as you won’t need to rack your brain over a forgotten password. Digital inclusion for this generation and the next
  • 13. How does it work? Also, the thumbprint is saved on a central database along with your phone details for retrieval and phone security purposes. Digital inclusion for this generation and the next
  • 14. Can I change settings on my Thumb Access?  Sure enough, the application is absolutely user-friendly permitting controlled changes in settings for customer satisfaction. Any change in settings will demand the pre-registered thumbprint so as to prevent intrusion. With this and more, you have it all the more secure. Digital inclusion for this generation and the next
  • 15. How does the App improve security?  Asa user, your accounts are safe against unwanted intrusions while your phone accessibility is controlled. You also get to track and find the location of your phone if lost or stolen thus going a long way in helping Police Investigations. Digital inclusion for this generation and the next
  • 16. How does the App improve security?  Since your phone will demand access code every two hours and for every attempt at unlocking (Preset), any unauthorized use through theft leaves the suspect without any means of using or changing any settings. This technology will also curb phone theft as stealing an access-protected phone will be unappealing. Since the application will be operating under system software, it will not be Digital inclusion for this liable to formatting. generation and the next
  • 17. How does the App improve security?  Sincethe phone will only be sold at designated retail centers, road-side sale of stolen phones will be considered illegal and termed as a criminal act. Robbery suspect will also be tracked using the stolen phone and it can be found even after being discarded. Change of SIM cards will be irrelevant to decoding or unlocking the phone. Digital inclusion for this generation and the next
  • 18. How does the App improve security?  Country security can be greatly improved through linking it with the appropriate database thus giving possible monitoring of migrations. The user can also set the thumbprint as a permission code for switching of the phone. In order to preserve necessary information, time changes will immediately occur with a change in time zones. All users need to do is to notify the phone/software manufacturers on the theft of their phones, information on the phone location will be Digital inclusion for this immediately sent to the user. generation and the next
  • 19. Can I use/find the software on any phone? Thumb Access is only available on touch-enabled phones and will be available for Symbian OS, Windows OS, Web OS, Android OS, i-OS, Blackberry OS and other collaborating touch-enabled phone categories. Digital inclusion for this generation and the next
  • 20. THANK YOU SEE YOU ALL AT THE TOP Thank You for Listening! IT TAKES A GOOD PROCESS TO BRING OUT A GOOD PRODUCT

Notas del editor

  1. What are 21 st century skills? True technology and media literacy Effective communication Critical thinking Problem solving And…collaboration The best learning environment to acquire these skills is an “eLearning” environment Access to ICT (Information and Communication Technology) has emerged as a key strategy to take education to a new level – by creating effective eLearning environments
  2. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  3. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  4. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  5. Whether you’re introducing or expanding ICT in your schools, successful implementation takes several key components working together: Strong technology Connectivity Professional development Improved learning methods and Digital curriculum All of these contribute to an eLearning environment where 21st century skills flourish and students thrive. Technology: PCs, servers, PDA/handhelds, cell phones, iPods*. Also: Wired communications and computing networks; wireless communications and computing networks. Connectivity: Wired or wireless. Wi-Fi and WiMAX are optimum. Professional development: Many flavors available. Intel’s Teach to the Future program offers professional development for teachers in 35 countries today. Improved learning methods: Student-centric learning, project-based learning, group collaboration, goal of developing higher-order thinking skills. Digital curriculum: Includes digital content, but is not the same thing as digital content. A digital curriculum is a teaching/learning approach that assumes that technology and connectivity are involved, and that takes advantage of those. So lesson plans are different, resources are different, AND the content is digital (from the Net, multimedia, CD-ROM, etc. – electronic-based, not paper-based).