SlideShare a Scribd company logo
1 of 14
Your Hand is the Key
MD Arshad Shareef
CONTENTS
• INTRODUCTION
• THE SOLUTION
• WHY PALMSECURE FOR SECURITY?
• EXTRACTION OF VEIN PATTERN
• FUNCTIONAL PRINCIPLE
• FEATURES
• USES
• APPLICATIONS
• PALM SECURE DEVICES
• CONCLUSION
• REFERENCES
Today passwords, personal identification numbers (four-digit PIN
numbers), and ID cards are used for personal identification. However,
cards can be stolen and passwords and numbers can be guessed or
forgotten. Another issue is how to handle growing numbers of
passwords. This results in a security risk, because three out of four
users share their online banking password with a nonfinancial Website:
47 percent share both ID and password. The management of many
passwords – including refreshing a web page after a given period of
time, or maintaining a high level of protection by using a long
password – is asking too much of many users. Passwords are typically
recorded in places that are not saved or on paper, which results in
passwords being lost, copied, stolen, or forgotten. Not to mention the
potential damage and extra administration effort that is necessary to
create new passwords or cards.
INTRODUCTION
THE SOLUTION
• Fujitsu has developed a contactless palm vein pattern authentication
technology, called Fujitsu PalmSecure.
• Fujitsu PalmSecure technology uses the very complex vein pattern in
the palm of your hand to identify you with great precision. More than
five million reference points of the vein pattern are captured by the
highly accurate PalmSecure sensor.
• The capturing and matching process is contactless – the sensor’s
surface is never touched, for hygienic reasons.
• Your palm vein pattern remains the same for your entire lifetime and
is different on your left and right hands. Even twins have different palm
vein patterns.
• Vein recognition technology is secure, because the authentication data
is inside your body in your circulatory system, making it very difficult
to forge.
WHY PALMSECURE FOR SECURITY?
• Vein patterns are unique to individuals and contain detailed
characteristics for formulation of algorithm template. The sensor
of the palm vein device can only recognize the pattern if the
deoxidized haemoglobin is actively flowing within the individual's
veins.
• Contactless authentication is hygienic and non-invasive, thus
promoting high-level of user acceptance.
• Advanced authentication algorithm produces high level of
accuracy and application versatility.
• Technology based on more than two decades of Fujitsu image
recognition experience.
When the palm is illuminated with near-infrared light, unlike the
image seen by the human eye [Figure 1(a)], the deoxidized
hemoglobin in the palm veins absorbs this light, which reduces the
reflection rate and causes the veins to appear as a black pattern
[Figure 1(b)]. In vein authentication based on this principle, the
region used for authentication is photographed with near-infrared
light and the vein pattern is extracted by image processing [Figure
1(c)] and registered.
EXTRACTION OF VEIN PATTERN
FUNCTIONAL PRINCIPLE
• Once a hand is placed in the right position above the PalmSecure
sensor emitting infra red light emblazed the hand.
• The infra red light redords the palm vein patterns and the sensor
encypts th received datas.
• After transfering the encrypted data to the PC the software converts
it to a biometric template and assignes an individual key.
• The protected biometric templates can be stored on a PC, device or
chip. Fujitsu evaluates the best way to match and store the data
together with the customer and its individual requirements.
• Maximum Security
• Maximum Accuracy
• Maximum Performance
• Highly Accepted
• Easy to use
• Hygeinic and non invasive
FEATURES
• Site Access Control
• Time recording
• Mobile applications
• Web and workplace
USES
APPLICATIONS
• Healthcare Solutions
• Financial Solutions
• Retail Solutions
• Genral enterprise solutions
• Facility, buliding and data centre solutions
• Office and company solutions
• PalmSecure ID Match
• PalmSecure Mouse Login Kit
• PalmSecure OEM Sensor STD
• PalmSecure Sensor Guide Kit STD
• PalmSecure U Guide
PALMSECURE DEVICES
CONCLUSION
• This technology is highly secure because it uses
information contained within the body and is also highly
accurate because the pattern of veins in the palm is
complex and unique to each individual.
• This technology will bring a revolution in the field of
science and technology.
• If we implement this technology in government offices
we can make employees to work as per office timings.
REFERENCES
• www.fujitsu.com

More Related Content

What's hot

What's hot (20)

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 

Similar to Palmsecure

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptxPallavi Goli
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 

Similar to Palmsecure (20)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Access Control
Access ControlAccess Control
Access Control
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Palmsecure

  • 1. Your Hand is the Key MD Arshad Shareef
  • 2. CONTENTS • INTRODUCTION • THE SOLUTION • WHY PALMSECURE FOR SECURITY? • EXTRACTION OF VEIN PATTERN • FUNCTIONAL PRINCIPLE • FEATURES • USES • APPLICATIONS • PALM SECURE DEVICES • CONCLUSION • REFERENCES
  • 3. Today passwords, personal identification numbers (four-digit PIN numbers), and ID cards are used for personal identification. However, cards can be stolen and passwords and numbers can be guessed or forgotten. Another issue is how to handle growing numbers of passwords. This results in a security risk, because three out of four users share their online banking password with a nonfinancial Website: 47 percent share both ID and password. The management of many passwords – including refreshing a web page after a given period of time, or maintaining a high level of protection by using a long password – is asking too much of many users. Passwords are typically recorded in places that are not saved or on paper, which results in passwords being lost, copied, stolen, or forgotten. Not to mention the potential damage and extra administration effort that is necessary to create new passwords or cards. INTRODUCTION
  • 4. THE SOLUTION • Fujitsu has developed a contactless palm vein pattern authentication technology, called Fujitsu PalmSecure. • Fujitsu PalmSecure technology uses the very complex vein pattern in the palm of your hand to identify you with great precision. More than five million reference points of the vein pattern are captured by the highly accurate PalmSecure sensor. • The capturing and matching process is contactless – the sensor’s surface is never touched, for hygienic reasons. • Your palm vein pattern remains the same for your entire lifetime and is different on your left and right hands. Even twins have different palm vein patterns. • Vein recognition technology is secure, because the authentication data is inside your body in your circulatory system, making it very difficult to forge.
  • 5. WHY PALMSECURE FOR SECURITY? • Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template. The sensor of the palm vein device can only recognize the pattern if the deoxidized haemoglobin is actively flowing within the individual's veins. • Contactless authentication is hygienic and non-invasive, thus promoting high-level of user acceptance. • Advanced authentication algorithm produces high level of accuracy and application versatility. • Technology based on more than two decades of Fujitsu image recognition experience.
  • 6. When the palm is illuminated with near-infrared light, unlike the image seen by the human eye [Figure 1(a)], the deoxidized hemoglobin in the palm veins absorbs this light, which reduces the reflection rate and causes the veins to appear as a black pattern [Figure 1(b)]. In vein authentication based on this principle, the region used for authentication is photographed with near-infrared light and the vein pattern is extracted by image processing [Figure 1(c)] and registered. EXTRACTION OF VEIN PATTERN
  • 8. • Once a hand is placed in the right position above the PalmSecure sensor emitting infra red light emblazed the hand. • The infra red light redords the palm vein patterns and the sensor encypts th received datas. • After transfering the encrypted data to the PC the software converts it to a biometric template and assignes an individual key. • The protected biometric templates can be stored on a PC, device or chip. Fujitsu evaluates the best way to match and store the data together with the customer and its individual requirements.
  • 9. • Maximum Security • Maximum Accuracy • Maximum Performance • Highly Accepted • Easy to use • Hygeinic and non invasive FEATURES
  • 10. • Site Access Control • Time recording • Mobile applications • Web and workplace USES
  • 11. APPLICATIONS • Healthcare Solutions • Financial Solutions • Retail Solutions • Genral enterprise solutions • Facility, buliding and data centre solutions • Office and company solutions
  • 12. • PalmSecure ID Match • PalmSecure Mouse Login Kit • PalmSecure OEM Sensor STD • PalmSecure Sensor Guide Kit STD • PalmSecure U Guide PALMSECURE DEVICES
  • 13. CONCLUSION • This technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. • This technology will bring a revolution in the field of science and technology. • If we implement this technology in government offices we can make employees to work as per office timings.