SlideShare a Scribd company logo
1 of 12
Download to read offline
Biometric Patient
     Identification
  Understanding the Differences Between 1:1
Verification, 1:Few Segmented Identification and
                 1:N Identification
Duplicate patient records can have
negative impacts on patient safety.




              www.RightPatient.com
Studies have shown that:
 • Avg. hospital duplicate rate is 5-10%
 • Hidden cost of duplicates = $50
 • 5 dupes/day = $78,000/year (based
   on 6 day week)


† McClellan, Molly. Duplicate Medical Records: A Survey of Twin Cities Healthcare Organizations. AMIA Annu Symp Proc. 2009; 2009:
421–425.


                                                       www.RightPatient.com
Using consultants or software to
   de-dupe medical records is
EXPENSIVE and TIME CONSUMING




             www.RightPatient.com
One hospital spent $729,000 in
   consulting fees to merge their
  duplicate medical records. Out of
 65,000 potential dupes, only 22,000
            were merged.


† McClellan, Molly. Duplicate Medical Records: A Survey of Twin Cities Healthcare Organizations. AMIA Annu Symp Proc. 2009; 2009:
421–425.


                                                       www.RightPatient.com
Biometric technology can prevent
duplicate patient records ONLY IF
   the system performs a true
 One-To-Many (1:N) comparison



             www.RightPatient.com
The Difference Between
Biometric Search Types


         www.RightPatient.com
One-to-One (1:1)
         Verification



 Here’s who I am     There’s my           Let’s confirm to
                      biometric             make sure!
                      template

“Are you who you claim to be?”
                   www.RightPatient.com
One-to-Few (1:Few)
  Segmented Identification
                                                DOB                DOB
                                               9/9/76             6/8/80



                                                         DOB
                                                        5/21/72




  Let’s hope        Scan your
 you can tell       biometric               System compares
me something                                only against small
about yourself                                 segment of
                                                database
“Are you in this group?”
                     www.RightPatient.com
One-to-Many (1:N)
         Identification



       Scan your
       biometric                   Compare against
                                    entire biometric
                                       database

“Who are you?”
                   www.RightPatient.com
Takeaways

• 1:1 and 1:Few CANNOT
  prevent duplicates or fraud
• 1:N CAN



              www.RightPatient.com
RightPatient™
Biometric Patient Identification System

                      Contact us for more information:

                      M2SYS Technology
                      1050 Crown Pointe Pkwy.
                      Suite 850
                      Atlanta, GA 30338

                      Phone: (770) 393-0986
                      Email: sales@m2sys.com

                      Twitter: @m2sys
                      YouTube: youtube.com/m2sys
                      Facebook: facebook.com/m2sys
                      LinkedIn: linkedin.com/




              www.RightPatient.com

More Related Content

Viewers also liked

Power point patient saftey final 2010
Power point patient saftey final 2010Power point patient saftey final 2010
Power point patient saftey final 2010Amal Al Zayer Alzayer
 
Patient safety
Patient safetyPatient safety
Patient safetyNc Das
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 

Viewers also liked (10)

Staff Meal Automation System
Staff Meal Automation SystemStaff Meal Automation System
Staff Meal Automation System
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Patient identification
Patient identificationPatient identification
Patient identification
 
Nursing Skills: Charting
Nursing Skills: ChartingNursing Skills: Charting
Nursing Skills: Charting
 
biometrics
biometricsbiometrics
biometrics
 
Power point patient saftey final 2010
Power point patient saftey final 2010Power point patient saftey final 2010
Power point patient saftey final 2010
 
Patient safety
Patient safetyPatient safety
Patient safety
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Understanding the Differences Between 1:1 Verification, 1:Few Segmentation and 1:N Identification for Biometric Patient Identification Systems

Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...
Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...
Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...DNA Compass
 
The Role Of Genetic Discrimination In Life Insurance
The Role Of Genetic Discrimination In Life InsuranceThe Role Of Genetic Discrimination In Life Insurance
The Role Of Genetic Discrimination In Life InsuranceJessica Hill
 
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로의료의 미래, 디지털 헬스케어: 신약개발을 중심으로
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로Yoon Sup Choi
 
Tailored Message NSF Final Presentation
Tailored Message NSF Final PresentationTailored Message NSF Final Presentation
Tailored Message NSF Final PresentationStanford University
 
Artificial Intelligence for Discovery
Artificial Intelligence for DiscoveryArtificial Intelligence for Discovery
Artificial Intelligence for DiscoveryDayOne
 
The Human Resources Representative Leader, It Is My Job Essay
The Human Resources Representative Leader, It Is My Job EssayThe Human Resources Representative Leader, It Is My Job Essay
The Human Resources Representative Leader, It Is My Job EssayMyel Ramos
 
Presentation at 2007 Meeting of Indian Health Service in San Diego
Presentation at 2007 Meeting of Indian Health Service in San DiegoPresentation at 2007 Meeting of Indian Health Service in San Diego
Presentation at 2007 Meeting of Indian Health Service in San DiegoNoel Eldridge
 
How To Write Ap Lang Essays. Online assignment writing service.
How To Write Ap Lang Essays. Online assignment writing service.How To Write Ap Lang Essays. Online assignment writing service.
How To Write Ap Lang Essays. Online assignment writing service.Amanda Anderson
 
Biometric identification in the healthcare sector
Biometric identification in the healthcare sectorBiometric identification in the healthcare sector
Biometric identification in the healthcare sectorFatima Aftab
 
Cancer Care in a Post Truth World
Cancer Care in a Post Truth World Cancer Care in a Post Truth World
Cancer Care in a Post Truth World Matthew Katz
 
Promise and peril: How artificial intelligence is transforming health care
Promise and peril: How artificial intelligence is transforming health carePromise and peril: How artificial intelligence is transforming health care
Promise and peril: How artificial intelligence is transforming health careΔρ. Γιώργος K. Κασάπης
 
Examples Of Credentialing
Examples Of CredentialingExamples Of Credentialing
Examples Of CredentialingAngela Roberts
 
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docx
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docxDiscussion Reasons Why Medicaid Expansion Is A Terrible Idea.docx
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docxwrite5
 
Rock Report: Big Data by @Rock_Health
Rock Report: Big Data by @Rock_HealthRock Report: Big Data by @Rock_Health
Rock Report: Big Data by @Rock_HealthRock Health
 
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009e-Patient Dave deBronkart
 
Take a look at the below link and then answer the below questions .docx
Take a look at the below link and then answer the below questions .docxTake a look at the below link and then answer the below questions .docx
Take a look at the below link and then answer the below questions .docxssuserf9c51d
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consentjohn wilbanks
 
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...The Mesothelioma Center at Asbestos.com
 

Similar to Understanding the Differences Between 1:1 Verification, 1:Few Segmentation and 1:N Identification for Biometric Patient Identification Systems (20)

Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...
Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...
Possible Solution for Managing the Worlds Personal Genetic Data - DNA Guide, ...
 
Ap Bio Chapter 23
Ap Bio Chapter 23Ap Bio Chapter 23
Ap Bio Chapter 23
 
The Role Of Genetic Discrimination In Life Insurance
The Role Of Genetic Discrimination In Life InsuranceThe Role Of Genetic Discrimination In Life Insurance
The Role Of Genetic Discrimination In Life Insurance
 
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로의료의 미래, 디지털 헬스케어: 신약개발을 중심으로
의료의 미래, 디지털 헬스케어: 신약개발을 중심으로
 
Tailored Message NSF Final Presentation
Tailored Message NSF Final PresentationTailored Message NSF Final Presentation
Tailored Message NSF Final Presentation
 
Artificial Intelligence for Discovery
Artificial Intelligence for DiscoveryArtificial Intelligence for Discovery
Artificial Intelligence for Discovery
 
The Human Resources Representative Leader, It Is My Job Essay
The Human Resources Representative Leader, It Is My Job EssayThe Human Resources Representative Leader, It Is My Job Essay
The Human Resources Representative Leader, It Is My Job Essay
 
Presentation at 2007 Meeting of Indian Health Service in San Diego
Presentation at 2007 Meeting of Indian Health Service in San DiegoPresentation at 2007 Meeting of Indian Health Service in San Diego
Presentation at 2007 Meeting of Indian Health Service in San Diego
 
How To Write Ap Lang Essays. Online assignment writing service.
How To Write Ap Lang Essays. Online assignment writing service.How To Write Ap Lang Essays. Online assignment writing service.
How To Write Ap Lang Essays. Online assignment writing service.
 
Biometric identification in the healthcare sector
Biometric identification in the healthcare sectorBiometric identification in the healthcare sector
Biometric identification in the healthcare sector
 
Cancer Care in a Post Truth World
Cancer Care in a Post Truth World Cancer Care in a Post Truth World
Cancer Care in a Post Truth World
 
Promise and peril: How artificial intelligence is transforming health care
Promise and peril: How artificial intelligence is transforming health carePromise and peril: How artificial intelligence is transforming health care
Promise and peril: How artificial intelligence is transforming health care
 
Examples Of Credentialing
Examples Of CredentialingExamples Of Credentialing
Examples Of Credentialing
 
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docx
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docxDiscussion Reasons Why Medicaid Expansion Is A Terrible Idea.docx
Discussion Reasons Why Medicaid Expansion Is A Terrible Idea.docx
 
Rock Report: Big Data by @Rock_Health
Rock Report: Big Data by @Rock_HealthRock Report: Big Data by @Rock_Health
Rock Report: Big Data by @Rock_Health
 
Genetics.ppt 3
Genetics.ppt 3Genetics.ppt 3
Genetics.ppt 3
 
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009
"Gimme my damn data!" - e-Patient Dave's keynote at Medicine 2.0 2009
 
Take a look at the below link and then answer the below questions .docx
Take a look at the below link and then answer the below questions .docxTake a look at the below link and then answer the below questions .docx
Take a look at the below link and then answer the below questions .docx
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consent
 
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...
The Mesothelioma Center's January Support Group - Finding Reliable Online Inf...
 

More from M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

More from M2SYS Technology (17)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Recently uploaded

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 

Recently uploaded (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 

Understanding the Differences Between 1:1 Verification, 1:Few Segmentation and 1:N Identification for Biometric Patient Identification Systems

  • 1. Biometric Patient Identification Understanding the Differences Between 1:1 Verification, 1:Few Segmented Identification and 1:N Identification
  • 2. Duplicate patient records can have negative impacts on patient safety. www.RightPatient.com
  • 3. Studies have shown that: • Avg. hospital duplicate rate is 5-10% • Hidden cost of duplicates = $50 • 5 dupes/day = $78,000/year (based on 6 day week) † McClellan, Molly. Duplicate Medical Records: A Survey of Twin Cities Healthcare Organizations. AMIA Annu Symp Proc. 2009; 2009: 421–425. www.RightPatient.com
  • 4. Using consultants or software to de-dupe medical records is EXPENSIVE and TIME CONSUMING www.RightPatient.com
  • 5. One hospital spent $729,000 in consulting fees to merge their duplicate medical records. Out of 65,000 potential dupes, only 22,000 were merged. † McClellan, Molly. Duplicate Medical Records: A Survey of Twin Cities Healthcare Organizations. AMIA Annu Symp Proc. 2009; 2009: 421–425. www.RightPatient.com
  • 6. Biometric technology can prevent duplicate patient records ONLY IF the system performs a true One-To-Many (1:N) comparison www.RightPatient.com
  • 7. The Difference Between Biometric Search Types www.RightPatient.com
  • 8. One-to-One (1:1) Verification Here’s who I am There’s my Let’s confirm to biometric make sure! template “Are you who you claim to be?” www.RightPatient.com
  • 9. One-to-Few (1:Few) Segmented Identification DOB DOB 9/9/76 6/8/80 DOB 5/21/72 Let’s hope Scan your you can tell biometric System compares me something only against small about yourself segment of database “Are you in this group?” www.RightPatient.com
  • 10. One-to-Many (1:N) Identification Scan your biometric Compare against entire biometric database “Who are you?” www.RightPatient.com
  • 11. Takeaways • 1:1 and 1:Few CANNOT prevent duplicates or fraud • 1:N CAN www.RightPatient.com
  • 12. RightPatient™ Biometric Patient Identification System Contact us for more information: M2SYS Technology 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 Phone: (770) 393-0986 Email: sales@m2sys.com Twitter: @m2sys YouTube: youtube.com/m2sys Facebook: facebook.com/m2sys LinkedIn: linkedin.com/ www.RightPatient.com